RHBA-2024:0599

Vulnerability from csaf_redhat - Published: 2024-01-30 13:46 - Updated: 2026-04-14 07:37
Summary
Red Hat Bug Fix Advisory: Migration Toolkit for Applications bug fix and enhancement update
Severity
Important
Notes
Topic: Migration Toolkit for Applications 7.0.0 release
Details: Migration Toolkit for Applications 7.0.0 Images
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as 'Important' as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit. CVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.

CWE-400 - Uncontrolled Resource Consumption
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHBA-2024:0599
Workaround The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.

A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as 'Important' as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit. CVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages. Security Bulletin https://access.redhat.com/security/vulnerabilities/RHSB-2023-003

CWE-400 - Uncontrolled Resource Consumption
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHBA-2024:0599
Workaround Users are strongly urged to update their software as soon as fixes are available. There are several mitigation approaches for this flaw. 1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available. 2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic. 3. Several package specific mitigations are also available. a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/ b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487 d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.
References
https://access.redhat.com/errata/RHBA-2024:0599 self
https://issues.redhat.com/browse/MTA-1014 external
https://issues.redhat.com/browse/MTA-1019 external
https://issues.redhat.com/browse/MTA-1024 external
https://issues.redhat.com/browse/MTA-1047 external
https://issues.redhat.com/browse/MTA-1130 external
https://issues.redhat.com/browse/MTA-1155 external
https://issues.redhat.com/browse/MTA-1175 external
https://issues.redhat.com/browse/MTA-1183 external
https://issues.redhat.com/browse/MTA-1185 external
https://issues.redhat.com/browse/MTA-1195 external
https://issues.redhat.com/browse/MTA-1196 external
https://issues.redhat.com/browse/MTA-1197 external
https://issues.redhat.com/browse/MTA-1203 external
https://issues.redhat.com/browse/MTA-1207 external
https://issues.redhat.com/browse/MTA-1247 external
https://issues.redhat.com/browse/MTA-1249 external
https://issues.redhat.com/browse/MTA-1250 external
https://issues.redhat.com/browse/MTA-1251 external
https://issues.redhat.com/browse/MTA-1252 external
https://issues.redhat.com/browse/MTA-1256 external
https://issues.redhat.com/browse/MTA-1258 external
https://issues.redhat.com/browse/MTA-1259 external
https://issues.redhat.com/browse/MTA-1262 external
https://issues.redhat.com/browse/MTA-1263 external
https://issues.redhat.com/browse/MTA-1264 external
https://issues.redhat.com/browse/MTA-1266 external
https://issues.redhat.com/browse/MTA-1268 external
https://issues.redhat.com/browse/MTA-1269 external
https://issues.redhat.com/browse/MTA-1271 external
https://issues.redhat.com/browse/MTA-1279 external
https://issues.redhat.com/browse/MTA-1281 external
https://issues.redhat.com/browse/MTA-1283 external
https://issues.redhat.com/browse/MTA-1284 external
https://issues.redhat.com/browse/MTA-1286 external
https://issues.redhat.com/browse/MTA-1288 external
https://issues.redhat.com/browse/MTA-1292 external
https://issues.redhat.com/browse/MTA-1293 external
https://issues.redhat.com/browse/MTA-1294 external
https://issues.redhat.com/browse/MTA-1295 external
https://issues.redhat.com/browse/MTA-1296 external
https://issues.redhat.com/browse/MTA-1297 external
https://issues.redhat.com/browse/MTA-1298 external
https://issues.redhat.com/browse/MTA-1299 external
https://issues.redhat.com/browse/MTA-1300 external
https://issues.redhat.com/browse/MTA-1302 external
https://issues.redhat.com/browse/MTA-1303 external
https://issues.redhat.com/browse/MTA-1304 external
https://issues.redhat.com/browse/MTA-1305 external
https://issues.redhat.com/browse/MTA-1306 external
https://issues.redhat.com/browse/MTA-1307 external
https://issues.redhat.com/browse/MTA-1309 external
https://issues.redhat.com/browse/MTA-1310 external
https://issues.redhat.com/browse/MTA-1311 external
https://issues.redhat.com/browse/MTA-1312 external
https://issues.redhat.com/browse/MTA-1314 external
https://issues.redhat.com/browse/MTA-1315 external
https://issues.redhat.com/browse/MTA-1316 external
https://issues.redhat.com/browse/MTA-1317 external
https://issues.redhat.com/browse/MTA-1320 external
https://issues.redhat.com/browse/MTA-1322 external
https://issues.redhat.com/browse/MTA-1323 external
https://issues.redhat.com/browse/MTA-1324 external
https://issues.redhat.com/browse/MTA-1326 external
https://issues.redhat.com/browse/MTA-1327 external
https://issues.redhat.com/browse/MTA-1328 external
https://issues.redhat.com/browse/MTA-1329 external
https://issues.redhat.com/browse/MTA-1330 external
https://issues.redhat.com/browse/MTA-1333 external
https://issues.redhat.com/browse/MTA-1334 external
https://issues.redhat.com/browse/MTA-1337 external
https://issues.redhat.com/browse/MTA-1338 external
https://issues.redhat.com/browse/MTA-1339 external
https://issues.redhat.com/browse/MTA-1340 external
https://issues.redhat.com/browse/MTA-1341 external
https://issues.redhat.com/browse/MTA-1343 external
https://issues.redhat.com/browse/MTA-1344 external
https://issues.redhat.com/browse/MTA-1345 external
https://issues.redhat.com/browse/MTA-1346 external
https://issues.redhat.com/browse/MTA-1347 external
https://issues.redhat.com/browse/MTA-1348 external
https://issues.redhat.com/browse/MTA-1349 external
https://issues.redhat.com/browse/MTA-1350 external
https://issues.redhat.com/browse/MTA-1351 external
https://issues.redhat.com/browse/MTA-1362 external
https://issues.redhat.com/browse/MTA-1364 external
https://issues.redhat.com/browse/MTA-1366 external
https://issues.redhat.com/browse/MTA-1367 external
https://issues.redhat.com/browse/MTA-1368 external
https://issues.redhat.com/browse/MTA-1369 external
https://issues.redhat.com/browse/MTA-1377 external
https://issues.redhat.com/browse/MTA-1378 external
https://issues.redhat.com/browse/MTA-1379 external
https://issues.redhat.com/browse/MTA-1381 external
https://issues.redhat.com/browse/MTA-1382 external
https://issues.redhat.com/browse/MTA-1383 external
https://issues.redhat.com/browse/MTA-1384 external
https://issues.redhat.com/browse/MTA-1385 external
https://issues.redhat.com/browse/MTA-1386 external
https://issues.redhat.com/browse/MTA-1387 external
https://issues.redhat.com/browse/MTA-1389 external
https://issues.redhat.com/browse/MTA-1391 external
https://issues.redhat.com/browse/MTA-1393 external
https://issues.redhat.com/browse/MTA-1394 external
https://issues.redhat.com/browse/MTA-1396 external
https://issues.redhat.com/browse/MTA-1397 external
https://issues.redhat.com/browse/MTA-1402 external
https://issues.redhat.com/browse/MTA-1405 external
https://issues.redhat.com/browse/MTA-1407 external
https://issues.redhat.com/browse/MTA-1419 external
https://issues.redhat.com/browse/MTA-1420 external
https://issues.redhat.com/browse/MTA-1422 external
https://issues.redhat.com/browse/MTA-1423 external
https://issues.redhat.com/browse/MTA-1424 external
https://issues.redhat.com/browse/MTA-1425 external
https://issues.redhat.com/browse/MTA-1426 external
https://issues.redhat.com/browse/MTA-1432 external
https://issues.redhat.com/browse/MTA-1434 external
https://issues.redhat.com/browse/MTA-1437 external
https://issues.redhat.com/browse/MTA-1438 external
https://issues.redhat.com/browse/MTA-1449 external
https://issues.redhat.com/browse/MTA-1450 external
https://issues.redhat.com/browse/MTA-1451 external
https://issues.redhat.com/browse/MTA-1452 external
https://issues.redhat.com/browse/MTA-1453 external
https://issues.redhat.com/browse/MTA-1455 external
https://issues.redhat.com/browse/MTA-1456 external
https://issues.redhat.com/browse/MTA-1458 external
https://issues.redhat.com/browse/MTA-1459 external
https://issues.redhat.com/browse/MTA-1465 external
https://issues.redhat.com/browse/MTA-1466 external
https://issues.redhat.com/browse/MTA-1467 external
https://issues.redhat.com/browse/MTA-1476 external
https://issues.redhat.com/browse/MTA-1477 external
https://issues.redhat.com/browse/MTA-1487 external
https://issues.redhat.com/browse/MTA-1489 external
https://issues.redhat.com/browse/MTA-1504 external
https://issues.redhat.com/browse/MTA-1505 external
https://issues.redhat.com/browse/MTA-1506 external
https://issues.redhat.com/browse/MTA-1532 external
https://issues.redhat.com/browse/MTA-1542 external
https://issues.redhat.com/browse/MTA-1543 external
https://issues.redhat.com/browse/MTA-1545 external
https://issues.redhat.com/browse/MTA-1576 external
https://issues.redhat.com/browse/MTA-1584 external
https://issues.redhat.com/browse/MTA-1585 external
https://issues.redhat.com/browse/MTA-1592 external
https://issues.redhat.com/browse/MTA-1598 external
https://issues.redhat.com/browse/MTA-1599 external
https://issues.redhat.com/browse/MTA-1600 external
https://issues.redhat.com/browse/MTA-1605 external
https://issues.redhat.com/browse/MTA-1606 external
https://issues.redhat.com/browse/MTA-1611 external
https://issues.redhat.com/browse/MTA-1621 external
https://issues.redhat.com/browse/MTA-1622 external
https://issues.redhat.com/browse/MTA-1625 external
https://issues.redhat.com/browse/MTA-1627 external
https://issues.redhat.com/browse/MTA-1628 external
https://issues.redhat.com/browse/MTA-1629 external
https://issues.redhat.com/browse/MTA-1640 external
https://issues.redhat.com/browse/MTA-1644 external
https://issues.redhat.com/browse/MTA-1645 external
https://issues.redhat.com/browse/MTA-1647 external
https://issues.redhat.com/browse/MTA-1649 external
https://issues.redhat.com/browse/MTA-1651 external
https://issues.redhat.com/browse/MTA-1654 external
https://issues.redhat.com/browse/MTA-1661 external
https://issues.redhat.com/browse/MTA-1664 external
https://issues.redhat.com/browse/MTA-1673 external
https://issues.redhat.com/browse/MTA-1674 external
https://issues.redhat.com/browse/MTA-1675 external
https://issues.redhat.com/browse/MTA-1676 external
https://issues.redhat.com/browse/MTA-1677 external
https://issues.redhat.com/browse/MTA-1678 external
https://issues.redhat.com/browse/MTA-1679 external
https://issues.redhat.com/browse/MTA-1680 external
https://issues.redhat.com/browse/MTA-1687 external
https://issues.redhat.com/browse/MTA-1693 external
https://issues.redhat.com/browse/MTA-1694 external
https://issues.redhat.com/browse/MTA-1711 external
https://issues.redhat.com/browse/MTA-1714 external
https://issues.redhat.com/browse/MTA-1715 external
https://issues.redhat.com/browse/MTA-1716 external
https://issues.redhat.com/browse/MTA-1717 external
https://issues.redhat.com/browse/MTA-1719 external
https://issues.redhat.com/browse/MTA-1720 external
https://issues.redhat.com/browse/MTA-1722 external
https://issues.redhat.com/browse/MTA-1723 external
https://issues.redhat.com/browse/MTA-1725 external
https://issues.redhat.com/browse/MTA-1739 external
https://issues.redhat.com/browse/MTA-1740 external
https://issues.redhat.com/browse/MTA-1746 external
https://issues.redhat.com/browse/MTA-1747 external
https://issues.redhat.com/browse/MTA-1749 external
https://issues.redhat.com/browse/MTA-1751 external
https://issues.redhat.com/browse/MTA-1752 external
https://issues.redhat.com/browse/MTA-1753 external
https://issues.redhat.com/browse/MTA-1754 external
https://issues.redhat.com/browse/MTA-1762 external
https://issues.redhat.com/browse/MTA-1779 external
https://issues.redhat.com/browse/MTA-1781 external
https://issues.redhat.com/browse/MTA-1783 external
https://issues.redhat.com/browse/MTA-1787 external
https://issues.redhat.com/browse/MTA-1791 external
https://issues.redhat.com/browse/MTA-1804 external
https://issues.redhat.com/browse/MTA-1805 external
https://issues.redhat.com/browse/MTA-1806 external
https://issues.redhat.com/browse/MTA-1810 external
https://issues.redhat.com/browse/MTA-1812 external
https://issues.redhat.com/browse/MTA-1813 external
https://issues.redhat.com/browse/MTA-1815 external
https://issues.redhat.com/browse/MTA-1826 external
https://issues.redhat.com/browse/MTA-1828 external
https://issues.redhat.com/browse/MTA-1834 external
https://issues.redhat.com/browse/MTA-1835 external
https://issues.redhat.com/browse/MTA-1836 external
https://issues.redhat.com/browse/MTA-1839 external
https://issues.redhat.com/browse/MTA-1840 external
https://issues.redhat.com/browse/MTA-1841 external
https://issues.redhat.com/browse/MTA-1842 external
https://issues.redhat.com/browse/MTA-1843 external
https://issues.redhat.com/browse/MTA-1844 external
https://issues.redhat.com/browse/MTA-1846 external
https://issues.redhat.com/browse/MTA-1858 external
https://issues.redhat.com/browse/MTA-1859 external
https://issues.redhat.com/browse/MTA-1860 external
https://issues.redhat.com/browse/MTA-1867 external
https://issues.redhat.com/browse/MTA-1871 external
https://issues.redhat.com/browse/MTA-1878 external
https://issues.redhat.com/browse/MTA-1879 external
https://issues.redhat.com/browse/MTA-1881 external
https://issues.redhat.com/browse/MTA-1882 external
https://issues.redhat.com/browse/MTA-1883 external
https://issues.redhat.com/browse/MTA-1891 external
https://issues.redhat.com/browse/MTA-1892 external
https://issues.redhat.com/browse/MTA-1893 external
https://issues.redhat.com/browse/MTA-1894 external
https://issues.redhat.com/browse/MTA-1895 external
https://issues.redhat.com/browse/MTA-1900 external
https://issues.redhat.com/browse/MTA-1902 external
https://issues.redhat.com/browse/MTA-1903 external
https://issues.redhat.com/browse/MTA-1905 external
https://issues.redhat.com/browse/MTA-1906 external
https://issues.redhat.com/browse/MTA-1907 external
https://issues.redhat.com/browse/MTA-1908 external
https://issues.redhat.com/browse/MTA-1921 external
https://issues.redhat.com/browse/MTA-1935 external
https://issues.redhat.com/browse/MTA-1940 external
https://issues.redhat.com/browse/MTA-1942 external
https://issues.redhat.com/browse/MTA-1945 external
https://issues.redhat.com/browse/MTA-1947 external
https://issues.redhat.com/browse/MTA-1954 external
https://issues.redhat.com/browse/MTA-1957 external
https://issues.redhat.com/browse/MTA-1966 external
https://issues.redhat.com/browse/MTA-1998 external
https://issues.redhat.com/browse/MTA-2009 external
https://issues.redhat.com/browse/MTA-2042 external
https://issues.redhat.com/browse/MTA-2089 external
https://issues.redhat.com/browse/MTA-393 external
https://issues.redhat.com/browse/MTA-466 external
https://issues.redhat.com/browse/MTA-473 external
https://issues.redhat.com/browse/MTA-696 external
https://issues.redhat.com/browse/MTA-701 external
https://issues.redhat.com/browse/MTA-742 external
https://issues.redhat.com/browse/MTA-748 external
https://issues.redhat.com/browse/MTA-810 external
https://issues.redhat.com/browse/MTA-849 external
https://issues.redhat.com/browse/MTA-991 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2023-39325 self
https://bugzilla.redhat.com/show_bug.cgi?id=2243296 external
https://access.redhat.com/security/vulnerabilitie… external
https://www.cve.org/CVERecord?id=CVE-2023-39325 external
https://nvd.nist.gov/vuln/detail/CVE-2023-39325 external
https://access.redhat.com/security/cve/CVE-2023-44487 external
https://go.dev/issue/63417 external
https://pkg.go.dev/vuln/GO-2023-2102 external
https://www.cisa.gov/news-events/alerts/2023/10/1… external
https://access.redhat.com/security/cve/CVE-2023-44487 self
https://bugzilla.redhat.com/show_bug.cgi?id=2242803 external
https://www.cve.org/CVERecord?id=CVE-2023-44487 external
https://nvd.nist.gov/vuln/detail/CVE-2023-44487 external
https://github.com/dotnet/announcements/issues/277 external
https://www.nginx.com/blog/http-2-rapid-reset-att… external
https://www.cisa.gov/known-exploited-vulnerabilit… external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Migration Toolkit for Applications 7.0.0 release",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Migration Toolkit for Applications 7.0.0 Images",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHBA-2024:0599",
        "url": "https://access.redhat.com/errata/RHBA-2024:0599"
      },
      {
        "category": "external",
        "summary": "MTA-1014",
        "url": "https://issues.redhat.com/browse/MTA-1014"
      },
      {
        "category": "external",
        "summary": "MTA-1019",
        "url": "https://issues.redhat.com/browse/MTA-1019"
      },
      {
        "category": "external",
        "summary": "MTA-1024",
        "url": "https://issues.redhat.com/browse/MTA-1024"
      },
      {
        "category": "external",
        "summary": "MTA-1047",
        "url": "https://issues.redhat.com/browse/MTA-1047"
      },
      {
        "category": "external",
        "summary": "MTA-1130",
        "url": "https://issues.redhat.com/browse/MTA-1130"
      },
      {
        "category": "external",
        "summary": "MTA-1155",
        "url": "https://issues.redhat.com/browse/MTA-1155"
      },
      {
        "category": "external",
        "summary": "MTA-1175",
        "url": "https://issues.redhat.com/browse/MTA-1175"
      },
      {
        "category": "external",
        "summary": "MTA-1183",
        "url": "https://issues.redhat.com/browse/MTA-1183"
      },
      {
        "category": "external",
        "summary": "MTA-1185",
        "url": "https://issues.redhat.com/browse/MTA-1185"
      },
      {
        "category": "external",
        "summary": "MTA-1195",
        "url": "https://issues.redhat.com/browse/MTA-1195"
      },
      {
        "category": "external",
        "summary": "MTA-1196",
        "url": "https://issues.redhat.com/browse/MTA-1196"
      },
      {
        "category": "external",
        "summary": "MTA-1197",
        "url": "https://issues.redhat.com/browse/MTA-1197"
      },
      {
        "category": "external",
        "summary": "MTA-1203",
        "url": "https://issues.redhat.com/browse/MTA-1203"
      },
      {
        "category": "external",
        "summary": "MTA-1207",
        "url": "https://issues.redhat.com/browse/MTA-1207"
      },
      {
        "category": "external",
        "summary": "MTA-1247",
        "url": "https://issues.redhat.com/browse/MTA-1247"
      },
      {
        "category": "external",
        "summary": "MTA-1249",
        "url": "https://issues.redhat.com/browse/MTA-1249"
      },
      {
        "category": "external",
        "summary": "MTA-1250",
        "url": "https://issues.redhat.com/browse/MTA-1250"
      },
      {
        "category": "external",
        "summary": "MTA-1251",
        "url": "https://issues.redhat.com/browse/MTA-1251"
      },
      {
        "category": "external",
        "summary": "MTA-1252",
        "url": "https://issues.redhat.com/browse/MTA-1252"
      },
      {
        "category": "external",
        "summary": "MTA-1256",
        "url": "https://issues.redhat.com/browse/MTA-1256"
      },
      {
        "category": "external",
        "summary": "MTA-1258",
        "url": "https://issues.redhat.com/browse/MTA-1258"
      },
      {
        "category": "external",
        "summary": "MTA-1259",
        "url": "https://issues.redhat.com/browse/MTA-1259"
      },
      {
        "category": "external",
        "summary": "MTA-1262",
        "url": "https://issues.redhat.com/browse/MTA-1262"
      },
      {
        "category": "external",
        "summary": "MTA-1263",
        "url": "https://issues.redhat.com/browse/MTA-1263"
      },
      {
        "category": "external",
        "summary": "MTA-1264",
        "url": "https://issues.redhat.com/browse/MTA-1264"
      },
      {
        "category": "external",
        "summary": "MTA-1266",
        "url": "https://issues.redhat.com/browse/MTA-1266"
      },
      {
        "category": "external",
        "summary": "MTA-1268",
        "url": "https://issues.redhat.com/browse/MTA-1268"
      },
      {
        "category": "external",
        "summary": "MTA-1269",
        "url": "https://issues.redhat.com/browse/MTA-1269"
      },
      {
        "category": "external",
        "summary": "MTA-1271",
        "url": "https://issues.redhat.com/browse/MTA-1271"
      },
      {
        "category": "external",
        "summary": "MTA-1279",
        "url": "https://issues.redhat.com/browse/MTA-1279"
      },
      {
        "category": "external",
        "summary": "MTA-1281",
        "url": "https://issues.redhat.com/browse/MTA-1281"
      },
      {
        "category": "external",
        "summary": "MTA-1283",
        "url": "https://issues.redhat.com/browse/MTA-1283"
      },
      {
        "category": "external",
        "summary": "MTA-1284",
        "url": "https://issues.redhat.com/browse/MTA-1284"
      },
      {
        "category": "external",
        "summary": "MTA-1286",
        "url": "https://issues.redhat.com/browse/MTA-1286"
      },
      {
        "category": "external",
        "summary": "MTA-1288",
        "url": "https://issues.redhat.com/browse/MTA-1288"
      },
      {
        "category": "external",
        "summary": "MTA-1292",
        "url": "https://issues.redhat.com/browse/MTA-1292"
      },
      {
        "category": "external",
        "summary": "MTA-1293",
        "url": "https://issues.redhat.com/browse/MTA-1293"
      },
      {
        "category": "external",
        "summary": "MTA-1294",
        "url": "https://issues.redhat.com/browse/MTA-1294"
      },
      {
        "category": "external",
        "summary": "MTA-1295",
        "url": "https://issues.redhat.com/browse/MTA-1295"
      },
      {
        "category": "external",
        "summary": "MTA-1296",
        "url": "https://issues.redhat.com/browse/MTA-1296"
      },
      {
        "category": "external",
        "summary": "MTA-1297",
        "url": "https://issues.redhat.com/browse/MTA-1297"
      },
      {
        "category": "external",
        "summary": "MTA-1298",
        "url": "https://issues.redhat.com/browse/MTA-1298"
      },
      {
        "category": "external",
        "summary": "MTA-1299",
        "url": "https://issues.redhat.com/browse/MTA-1299"
      },
      {
        "category": "external",
        "summary": "MTA-1300",
        "url": "https://issues.redhat.com/browse/MTA-1300"
      },
      {
        "category": "external",
        "summary": "MTA-1302",
        "url": "https://issues.redhat.com/browse/MTA-1302"
      },
      {
        "category": "external",
        "summary": "MTA-1303",
        "url": "https://issues.redhat.com/browse/MTA-1303"
      },
      {
        "category": "external",
        "summary": "MTA-1304",
        "url": "https://issues.redhat.com/browse/MTA-1304"
      },
      {
        "category": "external",
        "summary": "MTA-1305",
        "url": "https://issues.redhat.com/browse/MTA-1305"
      },
      {
        "category": "external",
        "summary": "MTA-1306",
        "url": "https://issues.redhat.com/browse/MTA-1306"
      },
      {
        "category": "external",
        "summary": "MTA-1307",
        "url": "https://issues.redhat.com/browse/MTA-1307"
      },
      {
        "category": "external",
        "summary": "MTA-1309",
        "url": "https://issues.redhat.com/browse/MTA-1309"
      },
      {
        "category": "external",
        "summary": "MTA-1310",
        "url": "https://issues.redhat.com/browse/MTA-1310"
      },
      {
        "category": "external",
        "summary": "MTA-1311",
        "url": "https://issues.redhat.com/browse/MTA-1311"
      },
      {
        "category": "external",
        "summary": "MTA-1312",
        "url": "https://issues.redhat.com/browse/MTA-1312"
      },
      {
        "category": "external",
        "summary": "MTA-1314",
        "url": "https://issues.redhat.com/browse/MTA-1314"
      },
      {
        "category": "external",
        "summary": "MTA-1315",
        "url": "https://issues.redhat.com/browse/MTA-1315"
      },
      {
        "category": "external",
        "summary": "MTA-1316",
        "url": "https://issues.redhat.com/browse/MTA-1316"
      },
      {
        "category": "external",
        "summary": "MTA-1317",
        "url": "https://issues.redhat.com/browse/MTA-1317"
      },
      {
        "category": "external",
        "summary": "MTA-1320",
        "url": "https://issues.redhat.com/browse/MTA-1320"
      },
      {
        "category": "external",
        "summary": "MTA-1322",
        "url": "https://issues.redhat.com/browse/MTA-1322"
      },
      {
        "category": "external",
        "summary": "MTA-1323",
        "url": "https://issues.redhat.com/browse/MTA-1323"
      },
      {
        "category": "external",
        "summary": "MTA-1324",
        "url": "https://issues.redhat.com/browse/MTA-1324"
      },
      {
        "category": "external",
        "summary": "MTA-1326",
        "url": "https://issues.redhat.com/browse/MTA-1326"
      },
      {
        "category": "external",
        "summary": "MTA-1327",
        "url": "https://issues.redhat.com/browse/MTA-1327"
      },
      {
        "category": "external",
        "summary": "MTA-1328",
        "url": "https://issues.redhat.com/browse/MTA-1328"
      },
      {
        "category": "external",
        "summary": "MTA-1329",
        "url": "https://issues.redhat.com/browse/MTA-1329"
      },
      {
        "category": "external",
        "summary": "MTA-1330",
        "url": "https://issues.redhat.com/browse/MTA-1330"
      },
      {
        "category": "external",
        "summary": "MTA-1333",
        "url": "https://issues.redhat.com/browse/MTA-1333"
      },
      {
        "category": "external",
        "summary": "MTA-1334",
        "url": "https://issues.redhat.com/browse/MTA-1334"
      },
      {
        "category": "external",
        "summary": "MTA-1337",
        "url": "https://issues.redhat.com/browse/MTA-1337"
      },
      {
        "category": "external",
        "summary": "MTA-1338",
        "url": "https://issues.redhat.com/browse/MTA-1338"
      },
      {
        "category": "external",
        "summary": "MTA-1339",
        "url": "https://issues.redhat.com/browse/MTA-1339"
      },
      {
        "category": "external",
        "summary": "MTA-1340",
        "url": "https://issues.redhat.com/browse/MTA-1340"
      },
      {
        "category": "external",
        "summary": "MTA-1341",
        "url": "https://issues.redhat.com/browse/MTA-1341"
      },
      {
        "category": "external",
        "summary": "MTA-1343",
        "url": "https://issues.redhat.com/browse/MTA-1343"
      },
      {
        "category": "external",
        "summary": "MTA-1344",
        "url": "https://issues.redhat.com/browse/MTA-1344"
      },
      {
        "category": "external",
        "summary": "MTA-1345",
        "url": "https://issues.redhat.com/browse/MTA-1345"
      },
      {
        "category": "external",
        "summary": "MTA-1346",
        "url": "https://issues.redhat.com/browse/MTA-1346"
      },
      {
        "category": "external",
        "summary": "MTA-1347",
        "url": "https://issues.redhat.com/browse/MTA-1347"
      },
      {
        "category": "external",
        "summary": "MTA-1348",
        "url": "https://issues.redhat.com/browse/MTA-1348"
      },
      {
        "category": "external",
        "summary": "MTA-1349",
        "url": "https://issues.redhat.com/browse/MTA-1349"
      },
      {
        "category": "external",
        "summary": "MTA-1350",
        "url": "https://issues.redhat.com/browse/MTA-1350"
      },
      {
        "category": "external",
        "summary": "MTA-1351",
        "url": "https://issues.redhat.com/browse/MTA-1351"
      },
      {
        "category": "external",
        "summary": "MTA-1362",
        "url": "https://issues.redhat.com/browse/MTA-1362"
      },
      {
        "category": "external",
        "summary": "MTA-1364",
        "url": "https://issues.redhat.com/browse/MTA-1364"
      },
      {
        "category": "external",
        "summary": "MTA-1366",
        "url": "https://issues.redhat.com/browse/MTA-1366"
      },
      {
        "category": "external",
        "summary": "MTA-1367",
        "url": "https://issues.redhat.com/browse/MTA-1367"
      },
      {
        "category": "external",
        "summary": "MTA-1368",
        "url": "https://issues.redhat.com/browse/MTA-1368"
      },
      {
        "category": "external",
        "summary": "MTA-1369",
        "url": "https://issues.redhat.com/browse/MTA-1369"
      },
      {
        "category": "external",
        "summary": "MTA-1377",
        "url": "https://issues.redhat.com/browse/MTA-1377"
      },
      {
        "category": "external",
        "summary": "MTA-1378",
        "url": "https://issues.redhat.com/browse/MTA-1378"
      },
      {
        "category": "external",
        "summary": "MTA-1379",
        "url": "https://issues.redhat.com/browse/MTA-1379"
      },
      {
        "category": "external",
        "summary": "MTA-1381",
        "url": "https://issues.redhat.com/browse/MTA-1381"
      },
      {
        "category": "external",
        "summary": "MTA-1382",
        "url": "https://issues.redhat.com/browse/MTA-1382"
      },
      {
        "category": "external",
        "summary": "MTA-1383",
        "url": "https://issues.redhat.com/browse/MTA-1383"
      },
      {
        "category": "external",
        "summary": "MTA-1384",
        "url": "https://issues.redhat.com/browse/MTA-1384"
      },
      {
        "category": "external",
        "summary": "MTA-1385",
        "url": "https://issues.redhat.com/browse/MTA-1385"
      },
      {
        "category": "external",
        "summary": "MTA-1386",
        "url": "https://issues.redhat.com/browse/MTA-1386"
      },
      {
        "category": "external",
        "summary": "MTA-1387",
        "url": "https://issues.redhat.com/browse/MTA-1387"
      },
      {
        "category": "external",
        "summary": "MTA-1389",
        "url": "https://issues.redhat.com/browse/MTA-1389"
      },
      {
        "category": "external",
        "summary": "MTA-1391",
        "url": "https://issues.redhat.com/browse/MTA-1391"
      },
      {
        "category": "external",
        "summary": "MTA-1393",
        "url": "https://issues.redhat.com/browse/MTA-1393"
      },
      {
        "category": "external",
        "summary": "MTA-1394",
        "url": "https://issues.redhat.com/browse/MTA-1394"
      },
      {
        "category": "external",
        "summary": "MTA-1396",
        "url": "https://issues.redhat.com/browse/MTA-1396"
      },
      {
        "category": "external",
        "summary": "MTA-1397",
        "url": "https://issues.redhat.com/browse/MTA-1397"
      },
      {
        "category": "external",
        "summary": "MTA-1402",
        "url": "https://issues.redhat.com/browse/MTA-1402"
      },
      {
        "category": "external",
        "summary": "MTA-1405",
        "url": "https://issues.redhat.com/browse/MTA-1405"
      },
      {
        "category": "external",
        "summary": "MTA-1407",
        "url": "https://issues.redhat.com/browse/MTA-1407"
      },
      {
        "category": "external",
        "summary": "MTA-1419",
        "url": "https://issues.redhat.com/browse/MTA-1419"
      },
      {
        "category": "external",
        "summary": "MTA-1420",
        "url": "https://issues.redhat.com/browse/MTA-1420"
      },
      {
        "category": "external",
        "summary": "MTA-1422",
        "url": "https://issues.redhat.com/browse/MTA-1422"
      },
      {
        "category": "external",
        "summary": "MTA-1423",
        "url": "https://issues.redhat.com/browse/MTA-1423"
      },
      {
        "category": "external",
        "summary": "MTA-1424",
        "url": "https://issues.redhat.com/browse/MTA-1424"
      },
      {
        "category": "external",
        "summary": "MTA-1425",
        "url": "https://issues.redhat.com/browse/MTA-1425"
      },
      {
        "category": "external",
        "summary": "MTA-1426",
        "url": "https://issues.redhat.com/browse/MTA-1426"
      },
      {
        "category": "external",
        "summary": "MTA-1432",
        "url": "https://issues.redhat.com/browse/MTA-1432"
      },
      {
        "category": "external",
        "summary": "MTA-1434",
        "url": "https://issues.redhat.com/browse/MTA-1434"
      },
      {
        "category": "external",
        "summary": "MTA-1437",
        "url": "https://issues.redhat.com/browse/MTA-1437"
      },
      {
        "category": "external",
        "summary": "MTA-1438",
        "url": "https://issues.redhat.com/browse/MTA-1438"
      },
      {
        "category": "external",
        "summary": "MTA-1449",
        "url": "https://issues.redhat.com/browse/MTA-1449"
      },
      {
        "category": "external",
        "summary": "MTA-1450",
        "url": "https://issues.redhat.com/browse/MTA-1450"
      },
      {
        "category": "external",
        "summary": "MTA-1451",
        "url": "https://issues.redhat.com/browse/MTA-1451"
      },
      {
        "category": "external",
        "summary": "MTA-1452",
        "url": "https://issues.redhat.com/browse/MTA-1452"
      },
      {
        "category": "external",
        "summary": "MTA-1453",
        "url": "https://issues.redhat.com/browse/MTA-1453"
      },
      {
        "category": "external",
        "summary": "MTA-1455",
        "url": "https://issues.redhat.com/browse/MTA-1455"
      },
      {
        "category": "external",
        "summary": "MTA-1456",
        "url": "https://issues.redhat.com/browse/MTA-1456"
      },
      {
        "category": "external",
        "summary": "MTA-1458",
        "url": "https://issues.redhat.com/browse/MTA-1458"
      },
      {
        "category": "external",
        "summary": "MTA-1459",
        "url": "https://issues.redhat.com/browse/MTA-1459"
      },
      {
        "category": "external",
        "summary": "MTA-1465",
        "url": "https://issues.redhat.com/browse/MTA-1465"
      },
      {
        "category": "external",
        "summary": "MTA-1466",
        "url": "https://issues.redhat.com/browse/MTA-1466"
      },
      {
        "category": "external",
        "summary": "MTA-1467",
        "url": "https://issues.redhat.com/browse/MTA-1467"
      },
      {
        "category": "external",
        "summary": "MTA-1476",
        "url": "https://issues.redhat.com/browse/MTA-1476"
      },
      {
        "category": "external",
        "summary": "MTA-1477",
        "url": "https://issues.redhat.com/browse/MTA-1477"
      },
      {
        "category": "external",
        "summary": "MTA-1487",
        "url": "https://issues.redhat.com/browse/MTA-1487"
      },
      {
        "category": "external",
        "summary": "MTA-1489",
        "url": "https://issues.redhat.com/browse/MTA-1489"
      },
      {
        "category": "external",
        "summary": "MTA-1504",
        "url": "https://issues.redhat.com/browse/MTA-1504"
      },
      {
        "category": "external",
        "summary": "MTA-1505",
        "url": "https://issues.redhat.com/browse/MTA-1505"
      },
      {
        "category": "external",
        "summary": "MTA-1506",
        "url": "https://issues.redhat.com/browse/MTA-1506"
      },
      {
        "category": "external",
        "summary": "MTA-1532",
        "url": "https://issues.redhat.com/browse/MTA-1532"
      },
      {
        "category": "external",
        "summary": "MTA-1542",
        "url": "https://issues.redhat.com/browse/MTA-1542"
      },
      {
        "category": "external",
        "summary": "MTA-1543",
        "url": "https://issues.redhat.com/browse/MTA-1543"
      },
      {
        "category": "external",
        "summary": "MTA-1545",
        "url": "https://issues.redhat.com/browse/MTA-1545"
      },
      {
        "category": "external",
        "summary": "MTA-1576",
        "url": "https://issues.redhat.com/browse/MTA-1576"
      },
      {
        "category": "external",
        "summary": "MTA-1584",
        "url": "https://issues.redhat.com/browse/MTA-1584"
      },
      {
        "category": "external",
        "summary": "MTA-1585",
        "url": "https://issues.redhat.com/browse/MTA-1585"
      },
      {
        "category": "external",
        "summary": "MTA-1592",
        "url": "https://issues.redhat.com/browse/MTA-1592"
      },
      {
        "category": "external",
        "summary": "MTA-1598",
        "url": "https://issues.redhat.com/browse/MTA-1598"
      },
      {
        "category": "external",
        "summary": "MTA-1599",
        "url": "https://issues.redhat.com/browse/MTA-1599"
      },
      {
        "category": "external",
        "summary": "MTA-1600",
        "url": "https://issues.redhat.com/browse/MTA-1600"
      },
      {
        "category": "external",
        "summary": "MTA-1605",
        "url": "https://issues.redhat.com/browse/MTA-1605"
      },
      {
        "category": "external",
        "summary": "MTA-1606",
        "url": "https://issues.redhat.com/browse/MTA-1606"
      },
      {
        "category": "external",
        "summary": "MTA-1611",
        "url": "https://issues.redhat.com/browse/MTA-1611"
      },
      {
        "category": "external",
        "summary": "MTA-1621",
        "url": "https://issues.redhat.com/browse/MTA-1621"
      },
      {
        "category": "external",
        "summary": "MTA-1622",
        "url": "https://issues.redhat.com/browse/MTA-1622"
      },
      {
        "category": "external",
        "summary": "MTA-1625",
        "url": "https://issues.redhat.com/browse/MTA-1625"
      },
      {
        "category": "external",
        "summary": "MTA-1627",
        "url": "https://issues.redhat.com/browse/MTA-1627"
      },
      {
        "category": "external",
        "summary": "MTA-1628",
        "url": "https://issues.redhat.com/browse/MTA-1628"
      },
      {
        "category": "external",
        "summary": "MTA-1629",
        "url": "https://issues.redhat.com/browse/MTA-1629"
      },
      {
        "category": "external",
        "summary": "MTA-1640",
        "url": "https://issues.redhat.com/browse/MTA-1640"
      },
      {
        "category": "external",
        "summary": "MTA-1644",
        "url": "https://issues.redhat.com/browse/MTA-1644"
      },
      {
        "category": "external",
        "summary": "MTA-1645",
        "url": "https://issues.redhat.com/browse/MTA-1645"
      },
      {
        "category": "external",
        "summary": "MTA-1647",
        "url": "https://issues.redhat.com/browse/MTA-1647"
      },
      {
        "category": "external",
        "summary": "MTA-1649",
        "url": "https://issues.redhat.com/browse/MTA-1649"
      },
      {
        "category": "external",
        "summary": "MTA-1651",
        "url": "https://issues.redhat.com/browse/MTA-1651"
      },
      {
        "category": "external",
        "summary": "MTA-1654",
        "url": "https://issues.redhat.com/browse/MTA-1654"
      },
      {
        "category": "external",
        "summary": "MTA-1661",
        "url": "https://issues.redhat.com/browse/MTA-1661"
      },
      {
        "category": "external",
        "summary": "MTA-1664",
        "url": "https://issues.redhat.com/browse/MTA-1664"
      },
      {
        "category": "external",
        "summary": "MTA-1673",
        "url": "https://issues.redhat.com/browse/MTA-1673"
      },
      {
        "category": "external",
        "summary": "MTA-1674",
        "url": "https://issues.redhat.com/browse/MTA-1674"
      },
      {
        "category": "external",
        "summary": "MTA-1675",
        "url": "https://issues.redhat.com/browse/MTA-1675"
      },
      {
        "category": "external",
        "summary": "MTA-1676",
        "url": "https://issues.redhat.com/browse/MTA-1676"
      },
      {
        "category": "external",
        "summary": "MTA-1677",
        "url": "https://issues.redhat.com/browse/MTA-1677"
      },
      {
        "category": "external",
        "summary": "MTA-1678",
        "url": "https://issues.redhat.com/browse/MTA-1678"
      },
      {
        "category": "external",
        "summary": "MTA-1679",
        "url": "https://issues.redhat.com/browse/MTA-1679"
      },
      {
        "category": "external",
        "summary": "MTA-1680",
        "url": "https://issues.redhat.com/browse/MTA-1680"
      },
      {
        "category": "external",
        "summary": "MTA-1687",
        "url": "https://issues.redhat.com/browse/MTA-1687"
      },
      {
        "category": "external",
        "summary": "MTA-1693",
        "url": "https://issues.redhat.com/browse/MTA-1693"
      },
      {
        "category": "external",
        "summary": "MTA-1694",
        "url": "https://issues.redhat.com/browse/MTA-1694"
      },
      {
        "category": "external",
        "summary": "MTA-1711",
        "url": "https://issues.redhat.com/browse/MTA-1711"
      },
      {
        "category": "external",
        "summary": "MTA-1714",
        "url": "https://issues.redhat.com/browse/MTA-1714"
      },
      {
        "category": "external",
        "summary": "MTA-1715",
        "url": "https://issues.redhat.com/browse/MTA-1715"
      },
      {
        "category": "external",
        "summary": "MTA-1716",
        "url": "https://issues.redhat.com/browse/MTA-1716"
      },
      {
        "category": "external",
        "summary": "MTA-1717",
        "url": "https://issues.redhat.com/browse/MTA-1717"
      },
      {
        "category": "external",
        "summary": "MTA-1719",
        "url": "https://issues.redhat.com/browse/MTA-1719"
      },
      {
        "category": "external",
        "summary": "MTA-1720",
        "url": "https://issues.redhat.com/browse/MTA-1720"
      },
      {
        "category": "external",
        "summary": "MTA-1722",
        "url": "https://issues.redhat.com/browse/MTA-1722"
      },
      {
        "category": "external",
        "summary": "MTA-1723",
        "url": "https://issues.redhat.com/browse/MTA-1723"
      },
      {
        "category": "external",
        "summary": "MTA-1725",
        "url": "https://issues.redhat.com/browse/MTA-1725"
      },
      {
        "category": "external",
        "summary": "MTA-1739",
        "url": "https://issues.redhat.com/browse/MTA-1739"
      },
      {
        "category": "external",
        "summary": "MTA-1740",
        "url": "https://issues.redhat.com/browse/MTA-1740"
      },
      {
        "category": "external",
        "summary": "MTA-1746",
        "url": "https://issues.redhat.com/browse/MTA-1746"
      },
      {
        "category": "external",
        "summary": "MTA-1747",
        "url": "https://issues.redhat.com/browse/MTA-1747"
      },
      {
        "category": "external",
        "summary": "MTA-1749",
        "url": "https://issues.redhat.com/browse/MTA-1749"
      },
      {
        "category": "external",
        "summary": "MTA-1751",
        "url": "https://issues.redhat.com/browse/MTA-1751"
      },
      {
        "category": "external",
        "summary": "MTA-1752",
        "url": "https://issues.redhat.com/browse/MTA-1752"
      },
      {
        "category": "external",
        "summary": "MTA-1753",
        "url": "https://issues.redhat.com/browse/MTA-1753"
      },
      {
        "category": "external",
        "summary": "MTA-1754",
        "url": "https://issues.redhat.com/browse/MTA-1754"
      },
      {
        "category": "external",
        "summary": "MTA-1762",
        "url": "https://issues.redhat.com/browse/MTA-1762"
      },
      {
        "category": "external",
        "summary": "MTA-1779",
        "url": "https://issues.redhat.com/browse/MTA-1779"
      },
      {
        "category": "external",
        "summary": "MTA-1781",
        "url": "https://issues.redhat.com/browse/MTA-1781"
      },
      {
        "category": "external",
        "summary": "MTA-1783",
        "url": "https://issues.redhat.com/browse/MTA-1783"
      },
      {
        "category": "external",
        "summary": "MTA-1787",
        "url": "https://issues.redhat.com/browse/MTA-1787"
      },
      {
        "category": "external",
        "summary": "MTA-1791",
        "url": "https://issues.redhat.com/browse/MTA-1791"
      },
      {
        "category": "external",
        "summary": "MTA-1804",
        "url": "https://issues.redhat.com/browse/MTA-1804"
      },
      {
        "category": "external",
        "summary": "MTA-1805",
        "url": "https://issues.redhat.com/browse/MTA-1805"
      },
      {
        "category": "external",
        "summary": "MTA-1806",
        "url": "https://issues.redhat.com/browse/MTA-1806"
      },
      {
        "category": "external",
        "summary": "MTA-1810",
        "url": "https://issues.redhat.com/browse/MTA-1810"
      },
      {
        "category": "external",
        "summary": "MTA-1812",
        "url": "https://issues.redhat.com/browse/MTA-1812"
      },
      {
        "category": "external",
        "summary": "MTA-1813",
        "url": "https://issues.redhat.com/browse/MTA-1813"
      },
      {
        "category": "external",
        "summary": "MTA-1815",
        "url": "https://issues.redhat.com/browse/MTA-1815"
      },
      {
        "category": "external",
        "summary": "MTA-1826",
        "url": "https://issues.redhat.com/browse/MTA-1826"
      },
      {
        "category": "external",
        "summary": "MTA-1828",
        "url": "https://issues.redhat.com/browse/MTA-1828"
      },
      {
        "category": "external",
        "summary": "MTA-1834",
        "url": "https://issues.redhat.com/browse/MTA-1834"
      },
      {
        "category": "external",
        "summary": "MTA-1835",
        "url": "https://issues.redhat.com/browse/MTA-1835"
      },
      {
        "category": "external",
        "summary": "MTA-1836",
        "url": "https://issues.redhat.com/browse/MTA-1836"
      },
      {
        "category": "external",
        "summary": "MTA-1839",
        "url": "https://issues.redhat.com/browse/MTA-1839"
      },
      {
        "category": "external",
        "summary": "MTA-1840",
        "url": "https://issues.redhat.com/browse/MTA-1840"
      },
      {
        "category": "external",
        "summary": "MTA-1841",
        "url": "https://issues.redhat.com/browse/MTA-1841"
      },
      {
        "category": "external",
        "summary": "MTA-1842",
        "url": "https://issues.redhat.com/browse/MTA-1842"
      },
      {
        "category": "external",
        "summary": "MTA-1843",
        "url": "https://issues.redhat.com/browse/MTA-1843"
      },
      {
        "category": "external",
        "summary": "MTA-1844",
        "url": "https://issues.redhat.com/browse/MTA-1844"
      },
      {
        "category": "external",
        "summary": "MTA-1846",
        "url": "https://issues.redhat.com/browse/MTA-1846"
      },
      {
        "category": "external",
        "summary": "MTA-1858",
        "url": "https://issues.redhat.com/browse/MTA-1858"
      },
      {
        "category": "external",
        "summary": "MTA-1859",
        "url": "https://issues.redhat.com/browse/MTA-1859"
      },
      {
        "category": "external",
        "summary": "MTA-1860",
        "url": "https://issues.redhat.com/browse/MTA-1860"
      },
      {
        "category": "external",
        "summary": "MTA-1867",
        "url": "https://issues.redhat.com/browse/MTA-1867"
      },
      {
        "category": "external",
        "summary": "MTA-1871",
        "url": "https://issues.redhat.com/browse/MTA-1871"
      },
      {
        "category": "external",
        "summary": "MTA-1878",
        "url": "https://issues.redhat.com/browse/MTA-1878"
      },
      {
        "category": "external",
        "summary": "MTA-1879",
        "url": "https://issues.redhat.com/browse/MTA-1879"
      },
      {
        "category": "external",
        "summary": "MTA-1881",
        "url": "https://issues.redhat.com/browse/MTA-1881"
      },
      {
        "category": "external",
        "summary": "MTA-1882",
        "url": "https://issues.redhat.com/browse/MTA-1882"
      },
      {
        "category": "external",
        "summary": "MTA-1883",
        "url": "https://issues.redhat.com/browse/MTA-1883"
      },
      {
        "category": "external",
        "summary": "MTA-1891",
        "url": "https://issues.redhat.com/browse/MTA-1891"
      },
      {
        "category": "external",
        "summary": "MTA-1892",
        "url": "https://issues.redhat.com/browse/MTA-1892"
      },
      {
        "category": "external",
        "summary": "MTA-1893",
        "url": "https://issues.redhat.com/browse/MTA-1893"
      },
      {
        "category": "external",
        "summary": "MTA-1894",
        "url": "https://issues.redhat.com/browse/MTA-1894"
      },
      {
        "category": "external",
        "summary": "MTA-1895",
        "url": "https://issues.redhat.com/browse/MTA-1895"
      },
      {
        "category": "external",
        "summary": "MTA-1900",
        "url": "https://issues.redhat.com/browse/MTA-1900"
      },
      {
        "category": "external",
        "summary": "MTA-1902",
        "url": "https://issues.redhat.com/browse/MTA-1902"
      },
      {
        "category": "external",
        "summary": "MTA-1903",
        "url": "https://issues.redhat.com/browse/MTA-1903"
      },
      {
        "category": "external",
        "summary": "MTA-1905",
        "url": "https://issues.redhat.com/browse/MTA-1905"
      },
      {
        "category": "external",
        "summary": "MTA-1906",
        "url": "https://issues.redhat.com/browse/MTA-1906"
      },
      {
        "category": "external",
        "summary": "MTA-1907",
        "url": "https://issues.redhat.com/browse/MTA-1907"
      },
      {
        "category": "external",
        "summary": "MTA-1908",
        "url": "https://issues.redhat.com/browse/MTA-1908"
      },
      {
        "category": "external",
        "summary": "MTA-1921",
        "url": "https://issues.redhat.com/browse/MTA-1921"
      },
      {
        "category": "external",
        "summary": "MTA-1935",
        "url": "https://issues.redhat.com/browse/MTA-1935"
      },
      {
        "category": "external",
        "summary": "MTA-1940",
        "url": "https://issues.redhat.com/browse/MTA-1940"
      },
      {
        "category": "external",
        "summary": "MTA-1942",
        "url": "https://issues.redhat.com/browse/MTA-1942"
      },
      {
        "category": "external",
        "summary": "MTA-1945",
        "url": "https://issues.redhat.com/browse/MTA-1945"
      },
      {
        "category": "external",
        "summary": "MTA-1947",
        "url": "https://issues.redhat.com/browse/MTA-1947"
      },
      {
        "category": "external",
        "summary": "MTA-1954",
        "url": "https://issues.redhat.com/browse/MTA-1954"
      },
      {
        "category": "external",
        "summary": "MTA-1957",
        "url": "https://issues.redhat.com/browse/MTA-1957"
      },
      {
        "category": "external",
        "summary": "MTA-1966",
        "url": "https://issues.redhat.com/browse/MTA-1966"
      },
      {
        "category": "external",
        "summary": "MTA-1998",
        "url": "https://issues.redhat.com/browse/MTA-1998"
      },
      {
        "category": "external",
        "summary": "MTA-2009",
        "url": "https://issues.redhat.com/browse/MTA-2009"
      },
      {
        "category": "external",
        "summary": "MTA-2042",
        "url": "https://issues.redhat.com/browse/MTA-2042"
      },
      {
        "category": "external",
        "summary": "MTA-2089",
        "url": "https://issues.redhat.com/browse/MTA-2089"
      },
      {
        "category": "external",
        "summary": "MTA-393",
        "url": "https://issues.redhat.com/browse/MTA-393"
      },
      {
        "category": "external",
        "summary": "MTA-466",
        "url": "https://issues.redhat.com/browse/MTA-466"
      },
      {
        "category": "external",
        "summary": "MTA-473",
        "url": "https://issues.redhat.com/browse/MTA-473"
      },
      {
        "category": "external",
        "summary": "MTA-696",
        "url": "https://issues.redhat.com/browse/MTA-696"
      },
      {
        "category": "external",
        "summary": "MTA-701",
        "url": "https://issues.redhat.com/browse/MTA-701"
      },
      {
        "category": "external",
        "summary": "MTA-742",
        "url": "https://issues.redhat.com/browse/MTA-742"
      },
      {
        "category": "external",
        "summary": "MTA-748",
        "url": "https://issues.redhat.com/browse/MTA-748"
      },
      {
        "category": "external",
        "summary": "MTA-810",
        "url": "https://issues.redhat.com/browse/MTA-810"
      },
      {
        "category": "external",
        "summary": "MTA-849",
        "url": "https://issues.redhat.com/browse/MTA-849"
      },
      {
        "category": "external",
        "summary": "MTA-991",
        "url": "https://issues.redhat.com/browse/MTA-991"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhba-2024_0599.json"
      }
    ],
    "title": "Red Hat Bug Fix Advisory: Migration Toolkit for Applications bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2026-04-14T07:37:35+00:00",
      "generator": {
        "date": "2026-04-14T07:37:35+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.7.5"
        }
      },
      "id": "RHBA-2024:0599",
      "initial_release_date": "2024-01-30T13:46:48+00:00",
      "revision_history": [
        {
          "date": "2024-01-30T13:46:48+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-01-30T13:46:48+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2026-04-14T07:37:35+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "MTA 7.0 for RHEL 9",
                "product": {
                  "name": "MTA 7.0 for RHEL 9",
                  "product_id": "9Base-MTA-7.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:migration_toolkit_applications:7.0::el9"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "MTA 7.0 for RHEL 8",
                "product": {
                  "name": "MTA 7.0 for RHEL 8",
                  "product_id": "8Base-MTA-7.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:migration_toolkit_applications:7.0::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Migration Toolkit for Applications"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
                "product": {
                  "name": "mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
                  "product_id": "mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-analyzer-addon-rhel9\u0026tag=7.0.0-36"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
                "product": {
                  "name": "mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
                  "product_id": "mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-analyzer-lsp-rhel9\u0026tag=7.0.0-22"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
                "product": {
                  "name": "mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
                  "product_id": "mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-cli-rhel9\u0026tag=7.0.0-44"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
                "product": {
                  "name": "mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
                  "product_id": "mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-hub-rhel9\u0026tag=7.0.0-31"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
                "product": {
                  "name": "mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
                  "product_id": "mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-operator-bundle\u0026tag=7.0.0-63"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
                "product": {
                  "name": "mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
                  "product_id": "mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-rhel8-operator\u0026tag=7.0.0-13"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
                "product": {
                  "name": "mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
                  "product_id": "mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-ui-rhel9\u0026tag=7.0.0-25"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64",
                "product": {
                  "name": "mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64",
                  "product_id": "mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-windup-shim-rhel9\u0026tag=7.0.0-31"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64 as a component of MTA 7.0 for RHEL 8",
          "product_id": "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64"
        },
        "product_reference": "mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
        "relates_to_product_reference": "8Base-MTA-7.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64 as a component of MTA 7.0 for RHEL 9",
          "product_id": "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64"
        },
        "product_reference": "mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
        "relates_to_product_reference": "9Base-MTA-7.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64 as a component of MTA 7.0 for RHEL 9",
          "product_id": "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64"
        },
        "product_reference": "mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
        "relates_to_product_reference": "9Base-MTA-7.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64 as a component of MTA 7.0 for RHEL 9",
          "product_id": "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64"
        },
        "product_reference": "mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
        "relates_to_product_reference": "9Base-MTA-7.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64 as a component of MTA 7.0 for RHEL 9",
          "product_id": "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64"
        },
        "product_reference": "mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
        "relates_to_product_reference": "9Base-MTA-7.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64 as a component of MTA 7.0 for RHEL 9",
          "product_id": "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64"
        },
        "product_reference": "mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
        "relates_to_product_reference": "9Base-MTA-7.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64 as a component of MTA 7.0 for RHEL 9",
          "product_id": "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64"
        },
        "product_reference": "mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
        "relates_to_product_reference": "9Base-MTA-7.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64 as a component of MTA 7.0 for RHEL 9",
          "product_id": "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
        },
        "product_reference": "mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64",
        "relates_to_product_reference": "9Base-MTA-7.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-39325",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2023-10-10T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
            "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
            "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
            "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
            "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2243296"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nAs go-lang vendors its dependencies, a package may contain a library with a known vulnerability, solely because of lower tier libraries including it as a part of its dependencies, but the vulnerable code is not reachable at runtime. In such cases the issue is not exploitable. We classify these situations as \u201cNot affected\u201d or \u201cWill not fix,\u201d depending on the risk of breaking other unrelated packages.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64"
        ],
        "known_not_affected": [
          "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
          "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
          "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
          "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
          "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
          "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
          "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-39325"
        },
        {
          "category": "external",
          "summary": "RHBZ#2243296",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
        },
        {
          "category": "external",
          "summary": "RHSB-2023-003",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
          "url": "https://access.redhat.com/security/cve/CVE-2023-44487"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/63417",
          "url": "https://go.dev/issue/63417"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2023-2102",
          "url": "https://pkg.go.dev/vuln/GO-2023-2102"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
          "url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
        }
      ],
      "release_date": "2023-10-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-01-30T13:46:48+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2024:0599"
        },
        {
          "category": "workaround",
          "details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
          "product_ids": [
            "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
            "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
            "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
            "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
            "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
            "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
            "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
            "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
            "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
            "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
            "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
    },
    {
      "cve": "CVE-2023-44487",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2023-10-09T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
            "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
            "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
            "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
            "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2242803"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64"
        ],
        "known_not_affected": [
          "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
          "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
          "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
          "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
          "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
          "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
          "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-44487"
        },
        {
          "category": "external",
          "summary": "RHBZ#2242803",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
        },
        {
          "category": "external",
          "summary": "RHSB-2023-003",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
        },
        {
          "category": "external",
          "summary": "https://github.com/dotnet/announcements/issues/277",
          "url": "https://github.com/dotnet/announcements/issues/277"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2023-2102",
          "url": "https://pkg.go.dev/vuln/GO-2023-2102"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
          "url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
        },
        {
          "category": "external",
          "summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
          "url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2023-10-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-01-30T13:46:48+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2024:0599"
        },
        {
          "category": "workaround",
          "details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n     a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n     b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n     c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n     d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n     e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
          "product_ids": [
            "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
            "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
            "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
            "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
            "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
            "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
            "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
            "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
            "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
            "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
            "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2023-10-10T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…