Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-32804 (GCVE-0-2021-32804)
Vulnerability from cvelistv5
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:56.070Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/tar" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/advisories/1770" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "node-tar", "vendor": "npm", "versions": [ { "status": "affected", "version": "\u003c 3.2.2" }, { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.4.14" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.0.6" }, { "status": "affected", "version": "\u003e= 6.0.0, \u003c 6.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-08T14:07:16", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/tar" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/advisories/1770" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "source": { "advisory": "GHSA-3jfq-g458-7qm9", "discovery": "UNKNOWN" }, "title": "Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32804", "STATE": "PUBLIC", "TITLE": "Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "node-tar", "version": { "version_data": [ { "version_value": "\u003c 3.2.2" }, { "version_value": "\u003e= 4.0.0, \u003c 4.4.14" }, { "version_value": "\u003e= 5.0.0, \u003c 5.0.6" }, { "version_value": "\u003e= 6.0.0, \u003c 6.1.1" } ] } } ] }, "vendor_name": "npm" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.npmjs.com/package/tar", "refsource": "MISC", "url": "https://www.npmjs.com/package/tar" }, { "name": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "refsource": "CONFIRM", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" }, { "name": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4", "refsource": "MISC", "url": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4" }, { "name": "https://www.npmjs.com/advisories/1770", "refsource": "MISC", "url": "https://www.npmjs.com/advisories/1770" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] }, "source": { "advisory": "GHSA-3jfq-g458-7qm9", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32804", "datePublished": "2021-08-03T19:10:12", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:56.070Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-32804\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2021-08-03T19:15:08.410\",\"lastModified\":\"2024-11-21T06:07:46.800\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The npm package \\\"tar\\\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.\"},{\"lang\":\"es\",\"value\":\"El paquete npm \\\"tar\\\" (tambi\u00e9n se conoce como node-tar) versiones anteriores a 6.1.1, 5.0.6, 4.4.14 y 3.3.2, presenta una vulnerabilidad de Creaci\u00f3n y Sobrescritura de archivos arbitraria debido a un saneo insuficiente de rutas absolutas. node-tar pretende impedir la extracci\u00f3n de rutas absolutas de archivos al convertir las rutas absolutas en relativas cuando el flag \\\"preservePaths\\\" no est\u00e1 establecido en \\\"true\\\". Esto se consigue eliminando el root de la ruta absoluta de cualquier ruta de archivo absoluta contenida en un archivo tar. Por ejemplo, \\\"home/user/.bashrc\\\" se convertir\u00eda en \\\"home/user/.bashrc\\\". Esta l\u00f3gica era insuficiente cuando las rutas de los archivos conten\u00edan roots de ruta repetidas, como \\\"////home/user/.bashrc\\\". \\\"node-tar\\\" s\u00f3lo eliminaba un \u00fanico root de esas rutas. Cuando se daba una ruta de archivo absoluta con ra\u00edces de ruta repetidas, la ruta resultante (por ejemplo, \\\"///home/user/.bashrc\\\") segu\u00eda resolvi\u00e9ndose como una ruta absoluta, permitiendo as\u00ed la creaci\u00f3n y sobrescritura de archivos arbitraria. Este problema se ha solucionado en las versiones 3.2.2, 4.4.14, 5.0.6 y 6.1.1. Los usuarios pueden solucionar esta vulnerabilidad sin necesidad de actualizar al crear un m\u00e9todo personalizado \\\"onentry\\\" que sanee \\\"entry.path\\\" o un m\u00e9todo \\\"filter\\\" que elimine las entradas con rutas absolutas. Consulte el aviso de GitHub mencionado para obtener m\u00e1s detalles. Tenga en cuenta CVE-2021-32803 que corrige un error similar en versiones posteriores de tar\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":5.8},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:P\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"3.2.2\",\"matchCriteriaId\":\"48083832-29DB-4428-836C-BC1072AC6384\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.4.14\",\"matchCriteriaId\":\"77DE1692-7EF1-43FF-95CB-B1EAA8CB030B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*\",\"versionStartIncluding\":\"5.0.0\",\"versionEndExcluding\":\"5.0.6\",\"matchCriteriaId\":\"EF8B9011-1EAA-4D9E-89CA-597D7309EE66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndExcluding\":\"6.1.1\",\"matchCriteriaId\":\"24EC2FC6-7549-4C94-9560-54A88703BCA5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:20.3.3:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"53B2BB06-A2F7-4603-89C3-C8500E55483A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:21.2.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"01E88C86-8C04-4A4A-BF45-9082AA783056\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.1.1\",\"matchCriteriaId\":\"B0F46497-4AB0-49A7-9453-CC26837BF253\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://www.npmjs.com/advisories/1770\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://www.npmjs.com/package/tar\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Product\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2021.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://www.npmjs.com/advisories/1770\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://www.npmjs.com/package/tar\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
ghsa-3jfq-g458-7qm9
Vulnerability from github
Impact
Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
node-tar
aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the preservePaths
flag is not set to true
. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example /home/user/.bashrc
would turn into home/user/.bashrc
.
This logic was insufficient when file paths contained repeated path roots such as ////home/user/.bashrc
. node-tar
would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. ///home/user/.bashrc
) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite.
Patches
3.2.2 || 4.4.14 || 5.0.6 || 6.1.1
NOTE: an adjacent issue CVE-2021-32803 affects this release level. Please ensure you update to the latest patch levels that address CVE-2021-32803 as well if this adjacent issue affects your node-tar
use case.
Workarounds
Users may work around this vulnerability without upgrading by creating a custom onentry
method which sanitizes the entry.path
or a filter
method which removes entries with absolute paths.
```js const path = require('path') const tar = require('tar')
tar.x({ file: 'archive.tgz', // either add this function... onentry: (entry) => { if (path.isAbsolute(entry.path)) { entry.path = sanitizeAbsolutePathSomehow(entry.path) entry.absolute = path.resolve(entry.path) } },
// or this one filter: (file, entry) => { if (path.isAbsolute(entry.path)) { return false } else { return true } } }) ```
Users are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves.
{ "affected": [ { "package": { "ecosystem": "npm", "name": "tar" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "3.2.2" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "tar" }, "ranges": [ { "events": [ { "introduced": "4.0.0" }, { "fixed": "4.4.14" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "tar" }, "ranges": [ { "events": [ { "introduced": "5.0.0" }, { "fixed": "5.0.6" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "tar" }, "ranges": [ { "events": [ { "introduced": "6.0.0" }, { "fixed": "6.1.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2021-32804" ], "database_specific": { "cwe_ids": [ "CWE-22" ], "github_reviewed": true, "github_reviewed_at": "2021-08-03T19:06:15Z", "nvd_published_at": "2021-08-03T19:15:00Z", "severity": "HIGH" }, "details": "### Impact\n\nArbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution\n\n`node-tar` aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. \n\nThis logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. \n\n### Patches\n\n3.2.2 || 4.4.14 || 5.0.6 || 6.1.1\n\nNOTE: an adjacent issue [CVE-2021-32803](https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw) affects this release level. Please ensure you update to the latest patch levels that address CVE-2021-32803 as well if this adjacent issue affects your `node-tar` use case.\n\n### Workarounds\n\nUsers may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths.\n\n```js\nconst path = require(\u0027path\u0027)\nconst tar = require(\u0027tar\u0027)\n\ntar.x({\n file: \u0027archive.tgz\u0027,\n // either add this function...\n onentry: (entry) =\u003e {\n if (path.isAbsolute(entry.path)) {\n entry.path = sanitizeAbsolutePathSomehow(entry.path)\n entry.absolute = path.resolve(entry.path)\n }\n },\n\n // or this one\n filter: (file, entry) =\u003e {\n if (path.isAbsolute(entry.path)) {\n return false\n } else {\n return true\n }\n }\n})\n```\n\nUsers are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves.", "id": "GHSA-3jfq-g458-7qm9", "modified": "2021-08-30T23:14:50Z", "published": "2021-08-03T19:06:36Z", "references": [ { "type": "WEB", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "type": "WEB", "url": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "type": "PACKAGE", "url": "https://github.com/npm/node-tar" }, { "type": "WEB", "url": "https://www.npmjs.com/advisories/1770" }, { "type": "WEB", "url": "https://www.npmjs.com/package/tar" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "type": "CVSS_V3" } ], "summary": "Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization" }
opensuse-su-2022:0704-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs8", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs8 fixes the following issues:\n\n- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).\n- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).\n- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).\n- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).\n- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-SLE-15.3-2022-704,openSUSE-SLE-15.4-2022-704", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0704-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2022:0704-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4BTHU2F626CTZYCXOBT5S7GWU3QXNTMZ/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2022:0704-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4BTHU2F626CTZYCXOBT5S7GWU3QXNTMZ/" }, { "category": "self", "summary": "SUSE Bug 1191962", "url": "https://bugzilla.suse.com/1191962" }, { "category": "self", "summary": "SUSE Bug 1191963", "url": "https://bugzilla.suse.com/1191963" }, { "category": "self", "summary": "SUSE Bug 1192153", "url": "https://bugzilla.suse.com/1192153" }, { "category": "self", "summary": "SUSE Bug 1192154", "url": "https://bugzilla.suse.com/1192154" }, { "category": "self", "summary": "SUSE Bug 1192696", "url": "https://bugzilla.suse.com/1192696" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23343 page", "url": "https://www.suse.com/security/cve/CVE-2021-23343/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32803 page", "url": "https://www.suse.com/security/cve/CVE-2021-32803/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32804 page", "url": "https://www.suse.com/security/cve/CVE-2021-32804/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3807 page", "url": "https://www.suse.com/security/cve/CVE-2021-3807/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3918 page", "url": "https://www.suse.com/security/cve/CVE-2021-3918/" } ], "title": "Security update for nodejs8", "tracking": { "current_release_date": "2022-03-03T17:26:35Z", "generator": { "date": "2022-03-03T17:26:35Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2022:0704-1", "initial_release_date": "2022-03-03T17:26:35Z", "revision_history": [ { "date": "2022-03-03T17:26:35Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs8-8.17.0-10.19.2.aarch64", "product": { "name": "nodejs8-8.17.0-10.19.2.aarch64", "product_id": "nodejs8-8.17.0-10.19.2.aarch64" } }, { "category": "product_version", "name": "nodejs8-devel-8.17.0-10.19.2.aarch64", "product": { "name": "nodejs8-devel-8.17.0-10.19.2.aarch64", "product_id": "nodejs8-devel-8.17.0-10.19.2.aarch64" } }, { "category": "product_version", "name": "npm8-8.17.0-10.19.2.aarch64", "product": { "name": "npm8-8.17.0-10.19.2.aarch64", "product_id": "npm8-8.17.0-10.19.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs8-docs-8.17.0-10.19.2.noarch", "product": { "name": "nodejs8-docs-8.17.0-10.19.2.noarch", "product_id": "nodejs8-docs-8.17.0-10.19.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.17.0-10.19.2.ppc64le", "product": { "name": "nodejs8-8.17.0-10.19.2.ppc64le", "product_id": "nodejs8-8.17.0-10.19.2.ppc64le" } }, { "category": "product_version", "name": "nodejs8-devel-8.17.0-10.19.2.ppc64le", "product": { "name": "nodejs8-devel-8.17.0-10.19.2.ppc64le", "product_id": "nodejs8-devel-8.17.0-10.19.2.ppc64le" } }, { "category": "product_version", "name": "npm8-8.17.0-10.19.2.ppc64le", "product": { "name": "npm8-8.17.0-10.19.2.ppc64le", "product_id": "npm8-8.17.0-10.19.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.17.0-10.19.2.s390x", "product": { "name": "nodejs8-8.17.0-10.19.2.s390x", "product_id": "nodejs8-8.17.0-10.19.2.s390x" } }, { "category": "product_version", "name": "nodejs8-devel-8.17.0-10.19.2.s390x", "product": { "name": "nodejs8-devel-8.17.0-10.19.2.s390x", "product_id": "nodejs8-devel-8.17.0-10.19.2.s390x" } }, { "category": "product_version", "name": "npm8-8.17.0-10.19.2.s390x", "product": { "name": "npm8-8.17.0-10.19.2.s390x", "product_id": "npm8-8.17.0-10.19.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.17.0-10.19.2.x86_64", "product": { "name": "nodejs8-8.17.0-10.19.2.x86_64", "product_id": "nodejs8-8.17.0-10.19.2.x86_64" } }, { "category": "product_version", "name": "nodejs8-devel-8.17.0-10.19.2.x86_64", "product": { "name": "nodejs8-devel-8.17.0-10.19.2.x86_64", "product_id": "nodejs8-devel-8.17.0-10.19.2.x86_64" } }, { "category": "product_version", "name": "npm8-8.17.0-10.19.2.x86_64", "product": { "name": "npm8-8.17.0-10.19.2.x86_64", "product_id": "npm8-8.17.0-10.19.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.aarch64" }, "product_reference": "nodejs8-8.17.0-10.19.2.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.ppc64le" }, "product_reference": "nodejs8-8.17.0-10.19.2.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.s390x" }, "product_reference": "nodejs8-8.17.0-10.19.2.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.aarch64" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.ppc64le" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.s390x" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-10.19.2.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs8-docs-8.17.0-10.19.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-10.19.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.aarch64" }, "product_reference": "npm8-8.17.0-10.19.2.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.ppc64le" }, "product_reference": "npm8-8.17.0-10.19.2.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.s390x" }, "product_reference": "npm8-8.17.0-10.19.2.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.x86_64" }, "product_reference": "npm8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-23343", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23343" } ], "notes": [ { "category": "general", "text": "All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-docs-8.17.0-10.19.2.noarch", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23343", "url": "https://www.suse.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "SUSE Bug 1192153 for CVE-2021-23343", "url": "https://bugzilla.suse.com/1192153" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-docs-8.17.0-10.19.2.noarch", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-docs-8.17.0-10.19.2.noarch", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-03T17:26:35Z", "details": "moderate" } ], "title": "CVE-2021-23343" }, { "cve": "CVE-2021-32803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32803" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-docs-8.17.0-10.19.2.noarch", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32803", "url": "https://www.suse.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191962" }, { "category": "external", "summary": "SUSE Bug 1191963 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-docs-8.17.0-10.19.2.noarch", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-docs-8.17.0-10.19.2.noarch", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-03T17:26:35Z", "details": "important" } ], "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32804" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-docs-8.17.0-10.19.2.noarch", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32804", "url": "https://www.suse.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32804", "url": "https://bugzilla.suse.com/1191962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-docs-8.17.0-10.19.2.noarch", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-docs-8.17.0-10.19.2.noarch", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-03T17:26:35Z", "details": "important" } ], "title": "CVE-2021-32804" }, { "cve": "CVE-2021-3807", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3807" } ], "notes": [ { "category": "general", "text": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-docs-8.17.0-10.19.2.noarch", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3807", "url": "https://www.suse.com/security/cve/CVE-2021-3807" }, { "category": "external", "summary": "SUSE Bug 1192154 for CVE-2021-3807", "url": "https://bugzilla.suse.com/1192154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-docs-8.17.0-10.19.2.noarch", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-docs-8.17.0-10.19.2.noarch", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-03T17:26:35Z", "details": "important" } ], "title": "CVE-2021-3807" }, { "cve": "CVE-2021-3918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3918" } ], "notes": [ { "category": "general", "text": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-docs-8.17.0-10.19.2.noarch", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3918", "url": "https://www.suse.com/security/cve/CVE-2021-3918" }, { "category": "external", "summary": "SUSE Bug 1192696 for CVE-2021-3918", "url": "https://bugzilla.suse.com/1192696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-docs-8.17.0-10.19.2.noarch", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:nodejs8-devel-8.17.0-10.19.2.x86_64", "openSUSE Leap 15.3:nodejs8-docs-8.17.0-10.19.2.noarch", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.aarch64", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.ppc64le", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.s390x", "openSUSE Leap 15.3:npm8-8.17.0-10.19.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-03T17:26:35Z", "details": "important" } ], "title": "CVE-2021-3918" } ] }
opensuse-su-2022:0715-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs14", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs14 fixes the following issues:\n\n- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).\n- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).\n- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).\n- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).\n- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-SLE-15.3-2022-715,openSUSE-SLE-15.4-2022-715", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0715-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2022:0715-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VAM6LOV2R24IH5PPUWLXB64PALLMBOTU/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2022:0715-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VAM6LOV2R24IH5PPUWLXB64PALLMBOTU/" }, { "category": "self", "summary": "SUSE Bug 1191962", "url": "https://bugzilla.suse.com/1191962" }, { "category": "self", "summary": "SUSE Bug 1191963", "url": "https://bugzilla.suse.com/1191963" }, { "category": "self", "summary": "SUSE Bug 1192153", "url": "https://bugzilla.suse.com/1192153" }, { "category": "self", "summary": "SUSE Bug 1192154", "url": "https://bugzilla.suse.com/1192154" }, { "category": "self", "summary": "SUSE Bug 1192696", "url": "https://bugzilla.suse.com/1192696" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23343 page", "url": "https://www.suse.com/security/cve/CVE-2021-23343/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32803 page", "url": "https://www.suse.com/security/cve/CVE-2021-32803/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32804 page", "url": "https://www.suse.com/security/cve/CVE-2021-32804/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3807 page", "url": "https://www.suse.com/security/cve/CVE-2021-3807/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3918 page", "url": "https://www.suse.com/security/cve/CVE-2021-3918/" } ], "title": "Security update for nodejs14", "tracking": { "current_release_date": "2022-03-04T08:37:55Z", "generator": { "date": "2022-03-04T08:37:55Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2022:0715-1", "initial_release_date": "2022-03-04T08:37:55Z", "revision_history": [ { "date": "2022-03-04T08:37:55Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs14-14.19.0-15.27.1.aarch64", "product": { "name": "nodejs14-14.19.0-15.27.1.aarch64", "product_id": "nodejs14-14.19.0-15.27.1.aarch64" } }, { "category": "product_version", "name": "nodejs14-devel-14.19.0-15.27.1.aarch64", "product": { "name": "nodejs14-devel-14.19.0-15.27.1.aarch64", "product_id": "nodejs14-devel-14.19.0-15.27.1.aarch64" } }, { "category": "product_version", "name": "npm14-14.19.0-15.27.1.aarch64", "product": { "name": "npm14-14.19.0-15.27.1.aarch64", "product_id": "npm14-14.19.0-15.27.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs14-docs-14.19.0-15.27.1.noarch", "product": { "name": "nodejs14-docs-14.19.0-15.27.1.noarch", "product_id": "nodejs14-docs-14.19.0-15.27.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs14-14.19.0-15.27.1.ppc64le", "product": { "name": "nodejs14-14.19.0-15.27.1.ppc64le", "product_id": "nodejs14-14.19.0-15.27.1.ppc64le" } }, { "category": "product_version", "name": "nodejs14-devel-14.19.0-15.27.1.ppc64le", "product": { "name": "nodejs14-devel-14.19.0-15.27.1.ppc64le", "product_id": "nodejs14-devel-14.19.0-15.27.1.ppc64le" } }, { "category": "product_version", "name": "npm14-14.19.0-15.27.1.ppc64le", "product": { "name": "npm14-14.19.0-15.27.1.ppc64le", "product_id": "npm14-14.19.0-15.27.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs14-14.19.0-15.27.1.s390x", "product": { "name": "nodejs14-14.19.0-15.27.1.s390x", "product_id": "nodejs14-14.19.0-15.27.1.s390x" } }, { "category": "product_version", "name": "nodejs14-devel-14.19.0-15.27.1.s390x", "product": { "name": "nodejs14-devel-14.19.0-15.27.1.s390x", "product_id": "nodejs14-devel-14.19.0-15.27.1.s390x" } }, { "category": "product_version", "name": "npm14-14.19.0-15.27.1.s390x", "product": { "name": "npm14-14.19.0-15.27.1.s390x", "product_id": "npm14-14.19.0-15.27.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs14-14.19.0-15.27.1.x86_64", "product": { "name": "nodejs14-14.19.0-15.27.1.x86_64", "product_id": "nodejs14-14.19.0-15.27.1.x86_64" } }, { "category": "product_version", "name": "nodejs14-devel-14.19.0-15.27.1.x86_64", "product": { "name": "nodejs14-devel-14.19.0-15.27.1.x86_64", "product_id": "nodejs14-devel-14.19.0-15.27.1.x86_64" } }, { "category": "product_version", "name": "npm14-14.19.0-15.27.1.x86_64", "product": { "name": "npm14-14.19.0-15.27.1.x86_64", "product_id": "npm14-14.19.0-15.27.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.aarch64" }, "product_reference": "nodejs14-14.19.0-15.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.ppc64le" }, "product_reference": "nodejs14-14.19.0-15.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.s390x" }, "product_reference": "nodejs14-14.19.0-15.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.aarch64" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.ppc64le" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.s390x" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-docs-14.19.0-15.27.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs14-docs-14.19.0-15.27.1.noarch" }, "product_reference": "nodejs14-docs-14.19.0-15.27.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.aarch64" }, "product_reference": "npm14-14.19.0-15.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.ppc64le" }, "product_reference": "npm14-14.19.0-15.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.s390x" }, "product_reference": "npm14-14.19.0-15.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.x86_64" }, "product_reference": "npm14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-23343", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23343" } ], "notes": [ { "category": "general", "text": "All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.19.0-15.27.1.noarch", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23343", "url": "https://www.suse.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "SUSE Bug 1192153 for CVE-2021-23343", "url": "https://bugzilla.suse.com/1192153" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.19.0-15.27.1.noarch", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.19.0-15.27.1.noarch", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-04T08:37:55Z", "details": "moderate" } ], "title": "CVE-2021-23343" }, { "cve": "CVE-2021-32803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32803" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.19.0-15.27.1.noarch", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32803", "url": "https://www.suse.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191962" }, { "category": "external", "summary": "SUSE Bug 1191963 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.19.0-15.27.1.noarch", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.19.0-15.27.1.noarch", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-04T08:37:55Z", "details": "important" } ], "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32804" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.19.0-15.27.1.noarch", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32804", "url": "https://www.suse.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32804", "url": "https://bugzilla.suse.com/1191962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.19.0-15.27.1.noarch", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.19.0-15.27.1.noarch", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-04T08:37:55Z", "details": "important" } ], "title": "CVE-2021-32804" }, { "cve": "CVE-2021-3807", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3807" } ], "notes": [ { "category": "general", "text": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.19.0-15.27.1.noarch", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3807", "url": "https://www.suse.com/security/cve/CVE-2021-3807" }, { "category": "external", "summary": "SUSE Bug 1192154 for CVE-2021-3807", "url": "https://bugzilla.suse.com/1192154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.19.0-15.27.1.noarch", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.19.0-15.27.1.noarch", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-04T08:37:55Z", "details": "important" } ], "title": "CVE-2021-3807" }, { "cve": "CVE-2021-3918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3918" } ], "notes": [ { "category": "general", "text": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.19.0-15.27.1.noarch", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3918", "url": "https://www.suse.com/security/cve/CVE-2021-3918" }, { "category": "external", "summary": "SUSE Bug 1192696 for CVE-2021-3918", "url": "https://bugzilla.suse.com/1192696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.19.0-15.27.1.noarch", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.19.0-15.27.1.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.19.0-15.27.1.noarch", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.aarch64", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.ppc64le", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.s390x", "openSUSE Leap 15.3:npm14-14.19.0-15.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-04T08:37:55Z", "details": "important" } ], "title": "CVE-2021-3918" } ] }
opensuse-su-2022:0657-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs12", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs12 fixes the following issues:\n\t \n- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).\n- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).\n- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).\n- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).\n- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-SLE-15.3-2022-657,openSUSE-SLE-15.4-2022-657", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0657-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2022:0657-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NCH4EEBMT6XZIRNVGTNBOCQCY4JVZ4IN/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2022:0657-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NCH4EEBMT6XZIRNVGTNBOCQCY4JVZ4IN/" }, { "category": "self", "summary": "SUSE Bug 1191962", "url": "https://bugzilla.suse.com/1191962" }, { "category": "self", "summary": "SUSE Bug 1191963", "url": "https://bugzilla.suse.com/1191963" }, { "category": "self", "summary": "SUSE Bug 1192153", "url": "https://bugzilla.suse.com/1192153" }, { "category": "self", "summary": "SUSE Bug 1192154", "url": "https://bugzilla.suse.com/1192154" }, { "category": "self", "summary": "SUSE Bug 1192696", "url": "https://bugzilla.suse.com/1192696" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23343 page", "url": "https://www.suse.com/security/cve/CVE-2021-23343/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32803 page", "url": "https://www.suse.com/security/cve/CVE-2021-32803/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32804 page", "url": "https://www.suse.com/security/cve/CVE-2021-32804/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3807 page", "url": "https://www.suse.com/security/cve/CVE-2021-3807/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3918 page", "url": "https://www.suse.com/security/cve/CVE-2021-3918/" } ], "title": "Security update for nodejs12", "tracking": { "current_release_date": "2022-03-02T09:11:57Z", "generator": { "date": "2022-03-02T09:11:57Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2022:0657-1", "initial_release_date": "2022-03-02T09:11:57Z", "revision_history": [ { "date": "2022-03-02T09:11:57Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs12-12.22.10-4.29.3.aarch64", "product": { "name": "nodejs12-12.22.10-4.29.3.aarch64", "product_id": "nodejs12-12.22.10-4.29.3.aarch64" } }, { "category": "product_version", "name": "nodejs12-devel-12.22.10-4.29.3.aarch64", "product": { "name": "nodejs12-devel-12.22.10-4.29.3.aarch64", "product_id": "nodejs12-devel-12.22.10-4.29.3.aarch64" } }, { "category": "product_version", "name": "npm12-12.22.10-4.29.3.aarch64", "product": { "name": "npm12-12.22.10-4.29.3.aarch64", "product_id": "npm12-12.22.10-4.29.3.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs12-docs-12.22.10-4.29.3.noarch", "product": { "name": "nodejs12-docs-12.22.10-4.29.3.noarch", "product_id": "nodejs12-docs-12.22.10-4.29.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.22.10-4.29.3.ppc64le", "product": { "name": "nodejs12-12.22.10-4.29.3.ppc64le", "product_id": "nodejs12-12.22.10-4.29.3.ppc64le" } }, { "category": "product_version", "name": "nodejs12-devel-12.22.10-4.29.3.ppc64le", "product": { "name": "nodejs12-devel-12.22.10-4.29.3.ppc64le", "product_id": "nodejs12-devel-12.22.10-4.29.3.ppc64le" } }, { "category": "product_version", "name": "npm12-12.22.10-4.29.3.ppc64le", "product": { "name": "npm12-12.22.10-4.29.3.ppc64le", "product_id": "npm12-12.22.10-4.29.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.22.10-4.29.3.s390x", "product": { "name": "nodejs12-12.22.10-4.29.3.s390x", "product_id": "nodejs12-12.22.10-4.29.3.s390x" } }, { "category": "product_version", "name": "nodejs12-devel-12.22.10-4.29.3.s390x", "product": { "name": "nodejs12-devel-12.22.10-4.29.3.s390x", "product_id": "nodejs12-devel-12.22.10-4.29.3.s390x" } }, { "category": "product_version", "name": "npm12-12.22.10-4.29.3.s390x", "product": { "name": "npm12-12.22.10-4.29.3.s390x", "product_id": "npm12-12.22.10-4.29.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.22.10-4.29.3.x86_64", "product": { "name": "nodejs12-12.22.10-4.29.3.x86_64", "product_id": "nodejs12-12.22.10-4.29.3.x86_64" } }, { "category": "product_version", "name": "nodejs12-devel-12.22.10-4.29.3.x86_64", "product": { "name": "nodejs12-devel-12.22.10-4.29.3.x86_64", "product_id": "nodejs12-devel-12.22.10-4.29.3.x86_64" } }, { "category": "product_version", "name": "npm12-12.22.10-4.29.3.x86_64", "product": { "name": "npm12-12.22.10-4.29.3.x86_64", "product_id": "npm12-12.22.10-4.29.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.aarch64" }, "product_reference": "nodejs12-12.22.10-4.29.3.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.ppc64le" }, "product_reference": "nodejs12-12.22.10-4.29.3.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.s390x" }, "product_reference": "nodejs12-12.22.10-4.29.3.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.aarch64" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.ppc64le" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.s390x" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-docs-12.22.10-4.29.3.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs12-docs-12.22.10-4.29.3.noarch" }, "product_reference": "nodejs12-docs-12.22.10-4.29.3.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.aarch64" }, "product_reference": "npm12-12.22.10-4.29.3.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.ppc64le" }, "product_reference": "npm12-12.22.10-4.29.3.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.s390x" }, "product_reference": "npm12-12.22.10-4.29.3.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.x86_64" }, "product_reference": "npm12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-23343", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23343" } ], "notes": [ { "category": "general", "text": "All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.10-4.29.3.noarch", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23343", "url": "https://www.suse.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "SUSE Bug 1192153 for CVE-2021-23343", "url": "https://bugzilla.suse.com/1192153" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.10-4.29.3.noarch", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.10-4.29.3.noarch", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-02T09:11:57Z", "details": "moderate" } ], "title": "CVE-2021-23343" }, { "cve": "CVE-2021-32803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32803" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.10-4.29.3.noarch", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32803", "url": "https://www.suse.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191962" }, { "category": "external", "summary": "SUSE Bug 1191963 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.10-4.29.3.noarch", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.10-4.29.3.noarch", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-02T09:11:57Z", "details": "important" } ], "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32804" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.10-4.29.3.noarch", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32804", "url": "https://www.suse.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32804", "url": "https://bugzilla.suse.com/1191962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.10-4.29.3.noarch", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.10-4.29.3.noarch", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-02T09:11:57Z", "details": "important" } ], "title": "CVE-2021-32804" }, { "cve": "CVE-2021-3807", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3807" } ], "notes": [ { "category": "general", "text": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.10-4.29.3.noarch", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3807", "url": "https://www.suse.com/security/cve/CVE-2021-3807" }, { "category": "external", "summary": "SUSE Bug 1192154 for CVE-2021-3807", "url": "https://bugzilla.suse.com/1192154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.10-4.29.3.noarch", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.10-4.29.3.noarch", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-02T09:11:57Z", "details": "important" } ], "title": "CVE-2021-3807" }, { "cve": "CVE-2021-3918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3918" } ], "notes": [ { "category": "general", "text": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.10-4.29.3.noarch", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3918", "url": "https://www.suse.com/security/cve/CVE-2021-3918" }, { "category": "external", "summary": "SUSE Bug 1192696 for CVE-2021-3918", "url": "https://bugzilla.suse.com/1192696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.10-4.29.3.noarch", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.10-4.29.3.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.10-4.29.3.noarch", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.aarch64", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.ppc64le", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.s390x", "openSUSE Leap 15.3:npm12-12.22.10-4.29.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-02T09:11:57Z", "details": "important" } ], "title": "CVE-2021-3918" } ] }
suse-su-2022:0531-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs12", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs12 fixes the following issues:\n\n- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153). \n- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963). \n- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962). \n- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696). \n- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-531,SUSE-SLE-Module-Web-Scripting-12-2022-531", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0531-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0531-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220531-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0531-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010279.html" }, { "category": "self", "summary": "SUSE Bug 1191962", "url": "https://bugzilla.suse.com/1191962" }, { "category": "self", "summary": "SUSE Bug 1191963", "url": "https://bugzilla.suse.com/1191963" }, { "category": "self", "summary": "SUSE Bug 1192153", "url": "https://bugzilla.suse.com/1192153" }, { "category": "self", "summary": "SUSE Bug 1192154", "url": "https://bugzilla.suse.com/1192154" }, { "category": "self", "summary": "SUSE Bug 1192696", "url": "https://bugzilla.suse.com/1192696" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23343 page", "url": "https://www.suse.com/security/cve/CVE-2021-23343/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32803 page", "url": "https://www.suse.com/security/cve/CVE-2021-32803/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32804 page", "url": "https://www.suse.com/security/cve/CVE-2021-32804/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3807 page", "url": "https://www.suse.com/security/cve/CVE-2021-3807/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3918 page", "url": "https://www.suse.com/security/cve/CVE-2021-3918/" } ], "title": "Security update for nodejs12", "tracking": { "current_release_date": "2022-02-21T08:23:42Z", "generator": { "date": "2022-02-21T08:23:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0531-1", "initial_release_date": "2022-02-21T08:23:42Z", "revision_history": [ { "date": "2022-02-21T08:23:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs12-12.22.10-1.42.2.aarch64", "product": { "name": "nodejs12-12.22.10-1.42.2.aarch64", "product_id": "nodejs12-12.22.10-1.42.2.aarch64" } }, { "category": "product_version", "name": "nodejs12-devel-12.22.10-1.42.2.aarch64", "product": { "name": "nodejs12-devel-12.22.10-1.42.2.aarch64", "product_id": "nodejs12-devel-12.22.10-1.42.2.aarch64" } }, { "category": "product_version", "name": "npm12-12.22.10-1.42.2.aarch64", "product": { "name": "npm12-12.22.10-1.42.2.aarch64", "product_id": "npm12-12.22.10-1.42.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.22.10-1.42.2.i586", "product": { "name": "nodejs12-12.22.10-1.42.2.i586", "product_id": "nodejs12-12.22.10-1.42.2.i586" } }, { "category": "product_version", "name": "nodejs12-devel-12.22.10-1.42.2.i586", "product": { "name": "nodejs12-devel-12.22.10-1.42.2.i586", "product_id": "nodejs12-devel-12.22.10-1.42.2.i586" } }, { "category": "product_version", "name": "npm12-12.22.10-1.42.2.i586", "product": { "name": "npm12-12.22.10-1.42.2.i586", "product_id": "npm12-12.22.10-1.42.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs12-docs-12.22.10-1.42.2.noarch", "product": { "name": "nodejs12-docs-12.22.10-1.42.2.noarch", "product_id": "nodejs12-docs-12.22.10-1.42.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.22.10-1.42.2.ppc64le", "product": { "name": "nodejs12-12.22.10-1.42.2.ppc64le", "product_id": "nodejs12-12.22.10-1.42.2.ppc64le" } }, { "category": "product_version", "name": "nodejs12-devel-12.22.10-1.42.2.ppc64le", "product": { "name": "nodejs12-devel-12.22.10-1.42.2.ppc64le", "product_id": "nodejs12-devel-12.22.10-1.42.2.ppc64le" } }, { "category": "product_version", "name": "npm12-12.22.10-1.42.2.ppc64le", "product": { "name": "npm12-12.22.10-1.42.2.ppc64le", "product_id": "npm12-12.22.10-1.42.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.22.10-1.42.2.s390x", "product": { "name": "nodejs12-12.22.10-1.42.2.s390x", "product_id": "nodejs12-12.22.10-1.42.2.s390x" } }, { "category": "product_version", "name": "nodejs12-devel-12.22.10-1.42.2.s390x", "product": { "name": "nodejs12-devel-12.22.10-1.42.2.s390x", "product_id": "nodejs12-devel-12.22.10-1.42.2.s390x" } }, { "category": "product_version", "name": "npm12-12.22.10-1.42.2.s390x", "product": { "name": "npm12-12.22.10-1.42.2.s390x", "product_id": "npm12-12.22.10-1.42.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.22.10-1.42.2.x86_64", "product": { "name": "nodejs12-12.22.10-1.42.2.x86_64", "product_id": "nodejs12-12.22.10-1.42.2.x86_64" } }, { "category": "product_version", "name": "nodejs12-devel-12.22.10-1.42.2.x86_64", "product": { "name": "nodejs12-devel-12.22.10-1.42.2.x86_64", "product_id": "nodejs12-devel-12.22.10-1.42.2.x86_64" } }, { "category": "product_version", "name": "npm12-12.22.10-1.42.2.x86_64", "product": { "name": "npm12-12.22.10-1.42.2.x86_64", "product_id": "npm12-12.22.10-1.42.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 12", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-1.42.2.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.aarch64" }, "product_reference": "nodejs12-12.22.10-1.42.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-1.42.2.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.ppc64le" }, "product_reference": "nodejs12-12.22.10-1.42.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-1.42.2.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.s390x" }, "product_reference": "nodejs12-12.22.10-1.42.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-1.42.2.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.x86_64" }, "product_reference": "nodejs12-12.22.10-1.42.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-1.42.2.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.aarch64" }, "product_reference": "nodejs12-devel-12.22.10-1.42.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-1.42.2.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.ppc64le" }, "product_reference": "nodejs12-devel-12.22.10-1.42.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-1.42.2.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.s390x" }, "product_reference": "nodejs12-devel-12.22.10-1.42.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-1.42.2.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.x86_64" }, "product_reference": "nodejs12-devel-12.22.10-1.42.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-docs-12.22.10-1.42.2.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.10-1.42.2.noarch" }, "product_reference": "nodejs12-docs-12.22.10-1.42.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-1.42.2.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.aarch64" }, "product_reference": "npm12-12.22.10-1.42.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-1.42.2.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.ppc64le" }, "product_reference": "npm12-12.22.10-1.42.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-1.42.2.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.s390x" }, "product_reference": "npm12-12.22.10-1.42.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-1.42.2.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.x86_64" }, "product_reference": "npm12-12.22.10-1.42.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-23343", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23343" } ], "notes": [ { "category": "general", "text": "All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.10-1.42.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23343", "url": "https://www.suse.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "SUSE Bug 1192153 for CVE-2021-23343", "url": "https://bugzilla.suse.com/1192153" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.10-1.42.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.10-1.42.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-21T08:23:42Z", "details": "moderate" } ], "title": "CVE-2021-23343" }, { "cve": "CVE-2021-32803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32803" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.10-1.42.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32803", "url": "https://www.suse.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191962" }, { "category": "external", "summary": "SUSE Bug 1191963 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.10-1.42.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.10-1.42.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-21T08:23:42Z", "details": "important" } ], "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32804" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.10-1.42.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32804", "url": "https://www.suse.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32804", "url": "https://bugzilla.suse.com/1191962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.10-1.42.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.10-1.42.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-21T08:23:42Z", "details": "important" } ], "title": "CVE-2021-32804" }, { "cve": "CVE-2021-3807", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3807" } ], "notes": [ { "category": "general", "text": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.10-1.42.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3807", "url": "https://www.suse.com/security/cve/CVE-2021-3807" }, { "category": "external", "summary": "SUSE Bug 1192154 for CVE-2021-3807", "url": "https://bugzilla.suse.com/1192154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.10-1.42.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.10-1.42.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-21T08:23:42Z", "details": "important" } ], "title": "CVE-2021-3807" }, { "cve": "CVE-2021-3918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3918" } ], "notes": [ { "category": "general", "text": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.10-1.42.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3918", "url": "https://www.suse.com/security/cve/CVE-2021-3918" }, { "category": "external", "summary": "SUSE Bug 1192696 for CVE-2021-3918", "url": "https://bugzilla.suse.com/1192696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.10-1.42.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.10-1.42.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.10-1.42.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.10-1.42.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-21T08:23:42Z", "details": "important" } ], "title": "CVE-2021-3918" } ] }
suse-su-2022:0569-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs14", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs14 fixes the following issues:\n\n- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).\n- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).\n- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).\n- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).\n- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-569,SUSE-SLE-Module-Web-Scripting-12-2022-569", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0569-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0569-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220569-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0569-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010307.html" }, { "category": "self", "summary": "SUSE Bug 1191962", "url": "https://bugzilla.suse.com/1191962" }, { "category": "self", "summary": "SUSE Bug 1191963", "url": "https://bugzilla.suse.com/1191963" }, { "category": "self", "summary": "SUSE Bug 1192153", "url": "https://bugzilla.suse.com/1192153" }, { "category": "self", "summary": "SUSE Bug 1192154", "url": "https://bugzilla.suse.com/1192154" }, { "category": "self", "summary": "SUSE Bug 1192696", "url": "https://bugzilla.suse.com/1192696" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23343 page", "url": "https://www.suse.com/security/cve/CVE-2021-23343/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32803 page", "url": "https://www.suse.com/security/cve/CVE-2021-32803/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32804 page", "url": "https://www.suse.com/security/cve/CVE-2021-32804/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3807 page", "url": "https://www.suse.com/security/cve/CVE-2021-3807/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3918 page", "url": "https://www.suse.com/security/cve/CVE-2021-3918/" } ], "title": "Security update for nodejs14", "tracking": { "current_release_date": "2022-02-24T09:35:23Z", "generator": { "date": "2022-02-24T09:35:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0569-1", "initial_release_date": "2022-02-24T09:35:23Z", "revision_history": [ { "date": "2022-02-24T09:35:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "corepack14-14.19.0-6.24.1.aarch64", "product": { "name": "corepack14-14.19.0-6.24.1.aarch64", "product_id": "corepack14-14.19.0-6.24.1.aarch64" } }, { "category": "product_version", "name": "nodejs14-14.19.0-6.24.1.aarch64", "product": { "name": "nodejs14-14.19.0-6.24.1.aarch64", "product_id": "nodejs14-14.19.0-6.24.1.aarch64" } }, { "category": "product_version", "name": "nodejs14-devel-14.19.0-6.24.1.aarch64", "product": { "name": "nodejs14-devel-14.19.0-6.24.1.aarch64", "product_id": "nodejs14-devel-14.19.0-6.24.1.aarch64" } }, { "category": "product_version", "name": "npm14-14.19.0-6.24.1.aarch64", "product": { "name": "npm14-14.19.0-6.24.1.aarch64", "product_id": "npm14-14.19.0-6.24.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "corepack14-14.19.0-6.24.1.i586", "product": { "name": "corepack14-14.19.0-6.24.1.i586", "product_id": "corepack14-14.19.0-6.24.1.i586" } }, { "category": "product_version", "name": "nodejs14-14.19.0-6.24.1.i586", "product": { "name": "nodejs14-14.19.0-6.24.1.i586", "product_id": "nodejs14-14.19.0-6.24.1.i586" } }, { "category": "product_version", "name": "nodejs14-devel-14.19.0-6.24.1.i586", "product": { "name": "nodejs14-devel-14.19.0-6.24.1.i586", "product_id": "nodejs14-devel-14.19.0-6.24.1.i586" } }, { "category": "product_version", "name": "npm14-14.19.0-6.24.1.i586", "product": { "name": "npm14-14.19.0-6.24.1.i586", "product_id": "npm14-14.19.0-6.24.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs14-docs-14.19.0-6.24.1.noarch", "product": { "name": "nodejs14-docs-14.19.0-6.24.1.noarch", "product_id": "nodejs14-docs-14.19.0-6.24.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "corepack14-14.19.0-6.24.1.ppc64le", "product": { "name": "corepack14-14.19.0-6.24.1.ppc64le", "product_id": "corepack14-14.19.0-6.24.1.ppc64le" } }, { "category": "product_version", "name": "nodejs14-14.19.0-6.24.1.ppc64le", "product": { "name": "nodejs14-14.19.0-6.24.1.ppc64le", "product_id": "nodejs14-14.19.0-6.24.1.ppc64le" } }, { "category": "product_version", "name": "nodejs14-devel-14.19.0-6.24.1.ppc64le", "product": { "name": "nodejs14-devel-14.19.0-6.24.1.ppc64le", "product_id": "nodejs14-devel-14.19.0-6.24.1.ppc64le" } }, { "category": "product_version", "name": "npm14-14.19.0-6.24.1.ppc64le", "product": { "name": "npm14-14.19.0-6.24.1.ppc64le", "product_id": "npm14-14.19.0-6.24.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "corepack14-14.19.0-6.24.1.s390x", "product": { "name": "corepack14-14.19.0-6.24.1.s390x", "product_id": "corepack14-14.19.0-6.24.1.s390x" } }, { "category": "product_version", "name": "nodejs14-14.19.0-6.24.1.s390x", "product": { "name": "nodejs14-14.19.0-6.24.1.s390x", "product_id": "nodejs14-14.19.0-6.24.1.s390x" } }, { "category": "product_version", "name": "nodejs14-devel-14.19.0-6.24.1.s390x", "product": { "name": "nodejs14-devel-14.19.0-6.24.1.s390x", "product_id": "nodejs14-devel-14.19.0-6.24.1.s390x" } }, { "category": "product_version", "name": "npm14-14.19.0-6.24.1.s390x", "product": { "name": "npm14-14.19.0-6.24.1.s390x", "product_id": "npm14-14.19.0-6.24.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "corepack14-14.19.0-6.24.1.x86_64", "product": { "name": "corepack14-14.19.0-6.24.1.x86_64", "product_id": "corepack14-14.19.0-6.24.1.x86_64" } }, { "category": "product_version", "name": "nodejs14-14.19.0-6.24.1.x86_64", "product": { "name": "nodejs14-14.19.0-6.24.1.x86_64", "product_id": "nodejs14-14.19.0-6.24.1.x86_64" } }, { "category": "product_version", "name": "nodejs14-devel-14.19.0-6.24.1.x86_64", "product": { "name": "nodejs14-devel-14.19.0-6.24.1.x86_64", "product_id": "nodejs14-devel-14.19.0-6.24.1.x86_64" } }, { "category": "product_version", "name": "npm14-14.19.0-6.24.1.x86_64", "product": { "name": "npm14-14.19.0-6.24.1.x86_64", "product_id": "npm14-14.19.0-6.24.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 12", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-6.24.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.aarch64" }, "product_reference": "nodejs14-14.19.0-6.24.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-6.24.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.ppc64le" }, "product_reference": "nodejs14-14.19.0-6.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-6.24.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.s390x" }, "product_reference": "nodejs14-14.19.0-6.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-6.24.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.x86_64" }, "product_reference": "nodejs14-14.19.0-6.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-6.24.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.aarch64" }, "product_reference": "nodejs14-devel-14.19.0-6.24.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-6.24.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.ppc64le" }, "product_reference": "nodejs14-devel-14.19.0-6.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-6.24.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.s390x" }, "product_reference": "nodejs14-devel-14.19.0-6.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-6.24.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.x86_64" }, "product_reference": "nodejs14-devel-14.19.0-6.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-docs-14.19.0-6.24.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.19.0-6.24.1.noarch" }, "product_reference": "nodejs14-docs-14.19.0-6.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-6.24.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.aarch64" }, "product_reference": "npm14-14.19.0-6.24.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-6.24.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.ppc64le" }, "product_reference": "npm14-14.19.0-6.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-6.24.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.s390x" }, "product_reference": "npm14-14.19.0-6.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-6.24.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.x86_64" }, "product_reference": "npm14-14.19.0-6.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-23343", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23343" } ], "notes": [ { "category": "general", "text": "All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.19.0-6.24.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23343", "url": "https://www.suse.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "SUSE Bug 1192153 for CVE-2021-23343", "url": "https://bugzilla.suse.com/1192153" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.19.0-6.24.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.19.0-6.24.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-24T09:35:23Z", "details": "moderate" } ], "title": "CVE-2021-23343" }, { "cve": "CVE-2021-32803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32803" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.19.0-6.24.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32803", "url": "https://www.suse.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191962" }, { "category": "external", "summary": "SUSE Bug 1191963 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.19.0-6.24.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.19.0-6.24.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-24T09:35:23Z", "details": "important" } ], "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32804" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.19.0-6.24.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32804", "url": "https://www.suse.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32804", "url": "https://bugzilla.suse.com/1191962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.19.0-6.24.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.19.0-6.24.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-24T09:35:23Z", "details": "important" } ], "title": "CVE-2021-32804" }, { "cve": "CVE-2021-3807", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3807" } ], "notes": [ { "category": "general", "text": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.19.0-6.24.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3807", "url": "https://www.suse.com/security/cve/CVE-2021-3807" }, { "category": "external", "summary": "SUSE Bug 1192154 for CVE-2021-3807", "url": "https://bugzilla.suse.com/1192154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.19.0-6.24.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.19.0-6.24.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-24T09:35:23Z", "details": "important" } ], "title": "CVE-2021-3807" }, { "cve": "CVE-2021-3918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3918" } ], "notes": [ { "category": "general", "text": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.19.0-6.24.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3918", "url": "https://www.suse.com/security/cve/CVE-2021-3918" }, { "category": "external", "summary": "SUSE Bug 1192696 for CVE-2021-3918", "url": "https://bugzilla.suse.com/1192696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.19.0-6.24.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.19.0-6.24.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.19.0-6.24.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.19.0-6.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-24T09:35:23Z", "details": "important" } ], "title": "CVE-2021-3918" } ] }
suse-su-2022:0563-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs8", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs8 fixes the following issues:\n\t \n- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).\n- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).\n- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).\n- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).\n- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-563,SUSE-SLE-Product-HPC-15-2022-563,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-563,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-563,SUSE-SLE-Product-SLES-15-2022-563,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-563,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-563,SUSE-SLE-Product-SLES_SAP-15-2022-563,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-563,SUSE-Storage-6-2022-563", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0563-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0563-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220563-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0563-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010304.html" }, { "category": "self", "summary": "SUSE Bug 1191962", "url": "https://bugzilla.suse.com/1191962" }, { "category": "self", "summary": "SUSE Bug 1191963", "url": "https://bugzilla.suse.com/1191963" }, { "category": "self", "summary": "SUSE Bug 1192153", "url": "https://bugzilla.suse.com/1192153" }, { "category": "self", "summary": "SUSE Bug 1192154", "url": "https://bugzilla.suse.com/1192154" }, { "category": "self", "summary": "SUSE Bug 1192696", "url": "https://bugzilla.suse.com/1192696" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23343 page", "url": "https://www.suse.com/security/cve/CVE-2021-23343/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32803 page", "url": "https://www.suse.com/security/cve/CVE-2021-32803/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32804 page", "url": "https://www.suse.com/security/cve/CVE-2021-32804/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3807 page", "url": "https://www.suse.com/security/cve/CVE-2021-3807/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3918 page", "url": "https://www.suse.com/security/cve/CVE-2021-3918/" } ], "title": "Security update for nodejs8", "tracking": { "current_release_date": "2022-02-24T07:38:40Z", "generator": { "date": "2022-02-24T07:38:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0563-1", "initial_release_date": "2022-02-24T07:38:40Z", "revision_history": [ { "date": "2022-02-24T07:38:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs8-8.17.0-3.54.2.aarch64", "product": { "name": "nodejs8-8.17.0-3.54.2.aarch64", "product_id": "nodejs8-8.17.0-3.54.2.aarch64" } }, { "category": "product_version", "name": "nodejs8-devel-8.17.0-3.54.2.aarch64", "product": { "name": "nodejs8-devel-8.17.0-3.54.2.aarch64", "product_id": "nodejs8-devel-8.17.0-3.54.2.aarch64" } }, { "category": "product_version", "name": "npm8-8.17.0-3.54.2.aarch64", "product": { "name": "npm8-8.17.0-3.54.2.aarch64", "product_id": "npm8-8.17.0-3.54.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.17.0-3.54.2.i586", "product": { "name": "nodejs8-8.17.0-3.54.2.i586", "product_id": "nodejs8-8.17.0-3.54.2.i586" } }, { "category": "product_version", "name": "nodejs8-devel-8.17.0-3.54.2.i586", "product": { "name": "nodejs8-devel-8.17.0-3.54.2.i586", "product_id": "nodejs8-devel-8.17.0-3.54.2.i586" } }, { "category": "product_version", "name": "npm8-8.17.0-3.54.2.i586", "product": { "name": "npm8-8.17.0-3.54.2.i586", "product_id": "npm8-8.17.0-3.54.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs8-docs-8.17.0-3.54.2.noarch", "product": { "name": "nodejs8-docs-8.17.0-3.54.2.noarch", "product_id": "nodejs8-docs-8.17.0-3.54.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.17.0-3.54.2.ppc64le", "product": { "name": "nodejs8-8.17.0-3.54.2.ppc64le", "product_id": "nodejs8-8.17.0-3.54.2.ppc64le" } }, { "category": "product_version", "name": "nodejs8-devel-8.17.0-3.54.2.ppc64le", "product": { "name": "nodejs8-devel-8.17.0-3.54.2.ppc64le", "product_id": "nodejs8-devel-8.17.0-3.54.2.ppc64le" } }, { "category": "product_version", "name": "npm8-8.17.0-3.54.2.ppc64le", "product": { "name": "npm8-8.17.0-3.54.2.ppc64le", "product_id": "npm8-8.17.0-3.54.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.17.0-3.54.2.s390x", "product": { "name": "nodejs8-8.17.0-3.54.2.s390x", "product_id": "nodejs8-8.17.0-3.54.2.s390x" } }, { "category": "product_version", "name": "nodejs8-devel-8.17.0-3.54.2.s390x", "product": { "name": "nodejs8-devel-8.17.0-3.54.2.s390x", "product_id": "nodejs8-devel-8.17.0-3.54.2.s390x" } }, { "category": "product_version", "name": "npm8-8.17.0-3.54.2.s390x", "product": { "name": "npm8-8.17.0-3.54.2.s390x", "product_id": "npm8-8.17.0-3.54.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.17.0-3.54.2.x86_64", "product": { "name": "nodejs8-8.17.0-3.54.2.x86_64", "product_id": "nodejs8-8.17.0-3.54.2.x86_64" } }, { "category": "product_version", "name": "nodejs8-devel-8.17.0-3.54.2.x86_64", "product": { "name": "nodejs8-devel-8.17.0-3.54.2.x86_64", "product_id": "nodejs8-devel-8.17.0-3.54.2.x86_64" } }, { "category": "product_version", "name": "npm8-8.17.0-3.54.2.x86_64", "product": { "name": "npm8-8.17.0-3.54.2.x86_64", "product_id": "npm8-8.17.0-3.54.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp1" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 6", "product": { "name": "SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.aarch64" }, "product_reference": "nodejs8-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-3.54.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-3.54.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.aarch64" }, "product_reference": "npm8-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.x86_64" }, "product_reference": "npm8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64" }, "product_reference": "nodejs8-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-3.54.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-3.54.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.aarch64" }, "product_reference": "npm8-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.x86_64" }, "product_reference": "npm8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.aarch64" }, "product_reference": "nodejs8-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-3.54.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-3.54.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.aarch64" }, "product_reference": "npm8-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.x86_64" }, "product_reference": "npm8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64" }, "product_reference": "nodejs8-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-3.54.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-3.54.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64" }, "product_reference": "npm8-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64" }, "product_reference": "npm8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64" }, "product_reference": "nodejs8-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.ppc64le" }, "product_reference": "nodejs8-8.17.0-3.54.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.s390x" }, "product_reference": "nodejs8-8.17.0-3.54.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-3.54.2.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-3.54.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.aarch64" }, "product_reference": "npm8-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.ppc64le" }, "product_reference": "npm8-8.17.0-3.54.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.s390x" }, "product_reference": "npm8-8.17.0-3.54.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.x86_64" }, "product_reference": "npm8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-devel-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-3.54.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-docs-8.17.0-3.54.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-3.54.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:npm8-8.17.0-3.54.2.x86_64" }, "product_reference": "npm8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64" }, "product_reference": "nodejs8-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.ppc64le" }, "product_reference": "nodejs8-8.17.0-3.54.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.s390x" }, "product_reference": "nodejs8-8.17.0-3.54.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-3.54.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-3.54.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64" }, "product_reference": "npm8-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.ppc64le" }, "product_reference": "npm8-8.17.0-3.54.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.s390x" }, "product_reference": "npm8-8.17.0-3.54.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64" }, "product_reference": "npm8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.ppc64le" }, "product_reference": "nodejs8-8.17.0-3.54.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.ppc64le" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-3.54.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-docs-8.17.0-3.54.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-3.54.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.ppc64le" }, "product_reference": "npm8-8.17.0-3.54.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.x86_64" }, "product_reference": "npm8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.ppc64le" }, "product_reference": "nodejs8-8.17.0-3.54.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.ppc64le" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-3.54.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-docs-8.17.0-3.54.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-3.54.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.ppc64le" }, "product_reference": "npm8-8.17.0-3.54.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.x86_64" }, "product_reference": "npm8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.aarch64" }, "product_reference": "nodejs8-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-3.54.2.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.aarch64" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-3.54.2.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-3.54.2.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:nodejs8-docs-8.17.0-3.54.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-3.54.2.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.aarch64" }, "product_reference": "npm8-8.17.0-3.54.2.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-3.54.2.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.x86_64" }, "product_reference": "npm8-8.17.0-3.54.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-23343", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23343" } ], "notes": [ { "category": "general", "text": "All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23343", "url": "https://www.suse.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "SUSE Bug 1192153 for CVE-2021-23343", "url": "https://bugzilla.suse.com/1192153" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-24T07:38:40Z", "details": "moderate" } ], "title": "CVE-2021-23343" }, { "cve": "CVE-2021-32803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32803" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32803", "url": "https://www.suse.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191962" }, { "category": "external", "summary": "SUSE Bug 1191963 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-24T07:38:40Z", "details": "important" } ], "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32804" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32804", "url": "https://www.suse.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32804", "url": "https://bugzilla.suse.com/1191962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-24T07:38:40Z", "details": "important" } ], "title": "CVE-2021-32804" }, { "cve": "CVE-2021-3807", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3807" } ], "notes": [ { "category": "general", "text": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3807", "url": "https://www.suse.com/security/cve/CVE-2021-3807" }, { "category": "external", "summary": "SUSE Bug 1192154 for CVE-2021-3807", "url": "https://bugzilla.suse.com/1192154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-24T07:38:40Z", "details": "important" } ], "title": "CVE-2021-3807" }, { "cve": "CVE-2021-3918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3918" } ], "notes": [ { "category": "general", "text": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3918", "url": "https://www.suse.com/security/cve/CVE-2021-3918" }, { "category": "external", "summary": "SUSE Bug 1192696 for CVE-2021-3918", "url": "https://bugzilla.suse.com/1192696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Enterprise Storage 6:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.aarch64", "SUSE Enterprise Storage 6:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-devel-8.17.0-3.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs8-docs-8.17.0-3.54.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm8-8.17.0-3.54.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-24T07:38:40Z", "details": "important" } ], "title": "CVE-2021-3918" } ] }
suse-su-2022:0704-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs8", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs8 fixes the following issues:\n\n- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).\n- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).\n- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).\n- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).\n- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-704,SUSE-SLE-Product-HPC-15-2022-704,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-704,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-704,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-704,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-704,SUSE-SLE-Product-SLES-15-2022-704,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-704,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-704,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-704,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-704,SUSE-SLE-Product-SLES_SAP-15-2022-704,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-704,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-704,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-704,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-704,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-704,SUSE-Storage-6-2022-704,SUSE-Storage-7-2022-704", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0704-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0704-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220704-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0704-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010344.html" }, { "category": "self", "summary": "SUSE Bug 1191962", "url": "https://bugzilla.suse.com/1191962" }, { "category": "self", "summary": "SUSE Bug 1191963", "url": "https://bugzilla.suse.com/1191963" }, { "category": "self", "summary": "SUSE Bug 1192153", "url": "https://bugzilla.suse.com/1192153" }, { "category": "self", "summary": "SUSE Bug 1192154", "url": "https://bugzilla.suse.com/1192154" }, { "category": "self", "summary": "SUSE Bug 1192696", "url": "https://bugzilla.suse.com/1192696" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23343 page", "url": "https://www.suse.com/security/cve/CVE-2021-23343/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32803 page", "url": "https://www.suse.com/security/cve/CVE-2021-32803/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32804 page", "url": "https://www.suse.com/security/cve/CVE-2021-32804/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3807 page", "url": "https://www.suse.com/security/cve/CVE-2021-3807/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3918 page", "url": "https://www.suse.com/security/cve/CVE-2021-3918/" } ], "title": "Security update for nodejs8", "tracking": { "current_release_date": "2022-03-03T17:27:07Z", "generator": { "date": "2022-03-03T17:27:07Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0704-1", "initial_release_date": "2022-03-03T17:27:07Z", "revision_history": [ { "date": "2022-03-03T17:27:07Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs8-8.17.0-10.19.2.aarch64", "product": { "name": "nodejs8-8.17.0-10.19.2.aarch64", "product_id": "nodejs8-8.17.0-10.19.2.aarch64" } }, { "category": "product_version", "name": "nodejs8-devel-8.17.0-10.19.2.aarch64", "product": { "name": "nodejs8-devel-8.17.0-10.19.2.aarch64", "product_id": "nodejs8-devel-8.17.0-10.19.2.aarch64" } }, { "category": "product_version", "name": "npm8-8.17.0-10.19.2.aarch64", "product": { "name": "npm8-8.17.0-10.19.2.aarch64", "product_id": "npm8-8.17.0-10.19.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.17.0-10.19.2.i586", "product": { "name": "nodejs8-8.17.0-10.19.2.i586", "product_id": "nodejs8-8.17.0-10.19.2.i586" } }, { "category": "product_version", "name": "nodejs8-devel-8.17.0-10.19.2.i586", "product": { "name": "nodejs8-devel-8.17.0-10.19.2.i586", "product_id": "nodejs8-devel-8.17.0-10.19.2.i586" } }, { "category": "product_version", "name": "npm8-8.17.0-10.19.2.i586", "product": { "name": "npm8-8.17.0-10.19.2.i586", "product_id": "npm8-8.17.0-10.19.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs-common-2.0-3.4.1.noarch", "product": { "name": "nodejs-common-2.0-3.4.1.noarch", "product_id": "nodejs-common-2.0-3.4.1.noarch" } }, { "category": "product_version", "name": "nodejs8-docs-8.17.0-10.19.2.noarch", "product": { "name": "nodejs8-docs-8.17.0-10.19.2.noarch", "product_id": "nodejs8-docs-8.17.0-10.19.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.17.0-10.19.2.ppc64le", "product": { "name": "nodejs8-8.17.0-10.19.2.ppc64le", "product_id": "nodejs8-8.17.0-10.19.2.ppc64le" } }, { "category": "product_version", "name": "nodejs8-devel-8.17.0-10.19.2.ppc64le", "product": { "name": "nodejs8-devel-8.17.0-10.19.2.ppc64le", "product_id": "nodejs8-devel-8.17.0-10.19.2.ppc64le" } }, { "category": "product_version", "name": "npm8-8.17.0-10.19.2.ppc64le", "product": { "name": "npm8-8.17.0-10.19.2.ppc64le", "product_id": "npm8-8.17.0-10.19.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.17.0-10.19.2.s390x", "product": { "name": "nodejs8-8.17.0-10.19.2.s390x", "product_id": "nodejs8-8.17.0-10.19.2.s390x" } }, { "category": "product_version", "name": "nodejs8-devel-8.17.0-10.19.2.s390x", "product": { "name": "nodejs8-devel-8.17.0-10.19.2.s390x", "product_id": "nodejs8-devel-8.17.0-10.19.2.s390x" } }, { "category": "product_version", "name": "npm8-8.17.0-10.19.2.s390x", "product": { "name": "npm8-8.17.0-10.19.2.s390x", "product_id": "npm8-8.17.0-10.19.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.17.0-10.19.2.x86_64", "product": { "name": "nodejs8-8.17.0-10.19.2.x86_64", "product_id": "nodejs8-8.17.0-10.19.2.x86_64" } }, { "category": "product_version", "name": "nodejs8-devel-8.17.0-10.19.2.x86_64", "product": { "name": "nodejs8-devel-8.17.0-10.19.2.x86_64", "product_id": "nodejs8-devel-8.17.0-10.19.2.x86_64" } }, { "category": "product_version", "name": "npm8-8.17.0-10.19.2.x86_64", "product": { "name": "npm8-8.17.0-10.19.2.x86_64", "product_id": "npm8-8.17.0-10.19.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.1", "product": { "name": "SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Retail Branch Server 4.1", "product": { "name": "SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.1", "product": { "name": "SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.1" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 6", "product": { "name": "SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:6" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7", "product": { "name": "SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs-common-2.0-3.4.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs-common-2.0-3.4.1.noarch" }, "product_reference": "nodejs-common-2.0-3.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-common-2.0-3.4.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs-common-2.0-3.4.1.noarch" }, "product_reference": "nodejs-common-2.0-3.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-common-2.0-3.4.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs-common-2.0-3.4.1.noarch" }, "product_reference": "nodejs-common-2.0-3.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-common-2.0-3.4.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch" }, "product_reference": "nodejs-common-2.0-3.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-common-2.0-3.4.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs-common-2.0-3.4.1.noarch" }, "product_reference": "nodejs-common-2.0-3.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.aarch64" }, "product_reference": "nodejs8-8.17.0-10.19.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.aarch64" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-10.19.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-docs-8.17.0-10.19.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-10.19.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.aarch64" }, "product_reference": "npm8-8.17.0-10.19.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.x86_64" }, "product_reference": "npm8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-common-2.0-3.4.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch" }, "product_reference": "nodejs-common-2.0-3.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64" }, "product_reference": "nodejs8-8.17.0-10.19.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-10.19.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-10.19.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64" }, "product_reference": "npm8-8.17.0-10.19.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64" }, "product_reference": "npm8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-common-2.0-3.4.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs-common-2.0-3.4.1.noarch" }, "product_reference": "nodejs-common-2.0-3.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-common-2.0-3.4.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs-common-2.0-3.4.1.noarch" }, "product_reference": "nodejs-common-2.0-3.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-common-2.0-3.4.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch" }, "product_reference": "nodejs-common-2.0-3.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-common-2.0-3.4.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs-common-2.0-3.4.1.noarch" }, "product_reference": "nodejs-common-2.0-3.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-devel-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-10.19.2.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-docs-8.17.0-10.19.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-10.19.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:npm8-8.17.0-10.19.2.x86_64" }, "product_reference": "npm8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-common-2.0-3.4.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch" }, "product_reference": "nodejs-common-2.0-3.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64" }, "product_reference": "nodejs8-8.17.0-10.19.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.ppc64le" }, "product_reference": "nodejs8-8.17.0-10.19.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.s390x" }, "product_reference": "nodejs8-8.17.0-10.19.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.ppc64le" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.s390x" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-10.19.2.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-10.19.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64" }, "product_reference": "npm8-8.17.0-10.19.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.ppc64le" }, "product_reference": "npm8-8.17.0-10.19.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.s390x" }, "product_reference": "npm8-8.17.0-10.19.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64" }, "product_reference": "npm8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-common-2.0-3.4.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:nodejs-common-2.0-3.4.1.noarch" }, "product_reference": "nodejs-common-2.0-3.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-common-2.0-3.4.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs-common-2.0-3.4.1.noarch" }, "product_reference": "nodejs-common-2.0-3.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-common-2.0-3.4.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs-common-2.0-3.4.1.noarch" }, "product_reference": "nodejs-common-2.0-3.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.ppc64le" }, "product_reference": "nodejs8-8.17.0-10.19.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.ppc64le" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-10.19.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-docs-8.17.0-10.19.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-10.19.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.ppc64le" }, "product_reference": "npm8-8.17.0-10.19.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.x86_64" }, "product_reference": "npm8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-common-2.0-3.4.1.noarch as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:nodejs-common-2.0-3.4.1.noarch" }, "product_reference": "nodejs-common-2.0-3.4.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:nodejs8-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-10.19.2.noarch as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:nodejs8-docs-8.17.0-10.19.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-10.19.2.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:npm8-8.17.0-10.19.2.x86_64" }, "product_reference": "npm8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-common-2.0-3.4.1.noarch as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:nodejs-common-2.0-3.4.1.noarch" }, "product_reference": "nodejs-common-2.0-3.4.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:nodejs8-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-10.19.2.noarch as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-10.19.2.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:npm8-8.17.0-10.19.2.x86_64" }, "product_reference": "npm8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-common-2.0-3.4.1.noarch as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs-common-2.0-3.4.1.noarch" }, "product_reference": "nodejs-common-2.0-3.4.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.ppc64le" }, "product_reference": "nodejs8-8.17.0-10.19.2.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.s390x" }, "product_reference": "nodejs8-8.17.0-10.19.2.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.ppc64le" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.s390x" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-10.19.2.noarch as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-10.19.2.noarch", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.ppc64le" }, "product_reference": "npm8-8.17.0-10.19.2.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.s390x" }, "product_reference": "npm8-8.17.0-10.19.2.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.x86_64" }, "product_reference": "npm8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-common-2.0-3.4.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:nodejs-common-2.0-3.4.1.noarch" }, "product_reference": "nodejs-common-2.0-3.4.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-common-2.0-3.4.1.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs-common-2.0-3.4.1.noarch" }, "product_reference": "nodejs-common-2.0-3.4.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.aarch64" }, "product_reference": "nodejs8-8.17.0-10.19.2.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.17.0-10.19.2.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.aarch64" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.17.0-10.19.2.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.x86_64" }, "product_reference": "nodejs8-devel-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.17.0-10.19.2.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs8-docs-8.17.0-10.19.2.noarch" }, "product_reference": "nodejs8-docs-8.17.0-10.19.2.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.aarch64" }, "product_reference": "npm8-8.17.0-10.19.2.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.17.0-10.19.2.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.x86_64" }, "product_reference": "npm8-8.17.0-10.19.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-23343", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23343" } ], "notes": [ { "category": "general", "text": "All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Proxy 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Retail Branch Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Retail Branch Server 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23343", "url": "https://www.suse.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "SUSE Bug 1192153 for CVE-2021-23343", "url": "https://bugzilla.suse.com/1192153" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Proxy 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Retail Branch Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Retail Branch Server 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Proxy 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Retail Branch Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Retail Branch Server 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-03T17:27:07Z", "details": "moderate" } ], "title": "CVE-2021-23343" }, { "cve": "CVE-2021-32803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32803" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Proxy 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Retail Branch Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Retail Branch Server 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32803", "url": "https://www.suse.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191962" }, { "category": "external", "summary": "SUSE Bug 1191963 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Proxy 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Retail Branch Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Retail Branch Server 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Proxy 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Retail Branch Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Retail Branch Server 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-03T17:27:07Z", "details": "important" } ], "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32804" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Proxy 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Retail Branch Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Retail Branch Server 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32804", "url": "https://www.suse.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32804", "url": "https://bugzilla.suse.com/1191962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Proxy 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Retail Branch Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Retail Branch Server 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Proxy 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Retail Branch Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Retail Branch Server 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-03T17:27:07Z", "details": "important" } ], "title": "CVE-2021-32804" }, { "cve": "CVE-2021-3807", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3807" } ], "notes": [ { "category": "general", "text": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Proxy 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Retail Branch Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Retail Branch Server 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3807", "url": "https://www.suse.com/security/cve/CVE-2021-3807" }, { "category": "external", "summary": "SUSE Bug 1192154 for CVE-2021-3807", "url": "https://bugzilla.suse.com/1192154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Proxy 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Retail Branch Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Retail Branch Server 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Proxy 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Retail Branch Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Retail Branch Server 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-03T17:27:07Z", "details": "important" } ], "title": "CVE-2021-3807" }, { "cve": "CVE-2021-3918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3918" } ], "notes": [ { "category": "general", "text": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Proxy 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Retail Branch Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Retail Branch Server 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3918", "url": "https://www.suse.com/security/cve/CVE-2021-3918" }, { "category": "external", "summary": "SUSE Bug 1192696 for CVE-2021-3918", "url": "https://bugzilla.suse.com/1192696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Proxy 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Retail Branch Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Retail Branch Server 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs-common-2.0-3.4.1.noarch", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Enterprise Storage 7:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.aarch64", "SUSE Enterprise Storage 7:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs-common-2.0-3.4.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm8-8.17.0-10.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Proxy 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Proxy 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Proxy 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Retail Branch Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Retail Branch Server 4.1:npm8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs-common-2.0-3.4.1.noarch", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:nodejs8-devel-8.17.0-10.19.2.x86_64", "SUSE Manager Server 4.1:nodejs8-docs-8.17.0-10.19.2.noarch", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.ppc64le", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.s390x", "SUSE Manager Server 4.1:npm8-8.17.0-10.19.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-03T17:27:07Z", "details": "important" } ], "title": "CVE-2021-3918" } ] }
suse-su-2022:0715-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs14", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs14 fixes the following issues:\n\n- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).\n- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).\n- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).\n- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).\n- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-715,SUSE-SLE-Module-Web-Scripting-15-SP3-2022-715,SUSE-SLE-Module-Web-Scripting-15-SP4-2022-715,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-715,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-715,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-715,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-715,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-715,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-715,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-715,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-715,SUSE-Storage-7-2022-715", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0715-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0715-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220715-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0715-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010355.html" }, { "category": "self", "summary": "SUSE Bug 1191962", "url": "https://bugzilla.suse.com/1191962" }, { "category": "self", "summary": "SUSE Bug 1191963", "url": "https://bugzilla.suse.com/1191963" }, { "category": "self", "summary": "SUSE Bug 1192153", "url": "https://bugzilla.suse.com/1192153" }, { "category": "self", "summary": "SUSE Bug 1192154", "url": "https://bugzilla.suse.com/1192154" }, { "category": "self", "summary": "SUSE Bug 1192696", "url": "https://bugzilla.suse.com/1192696" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23343 page", "url": "https://www.suse.com/security/cve/CVE-2021-23343/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32803 page", "url": "https://www.suse.com/security/cve/CVE-2021-32803/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32804 page", "url": "https://www.suse.com/security/cve/CVE-2021-32804/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3807 page", "url": "https://www.suse.com/security/cve/CVE-2021-3807/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3918 page", "url": "https://www.suse.com/security/cve/CVE-2021-3918/" } ], "title": "Security update for nodejs14", "tracking": { "current_release_date": "2022-03-04T08:38:26Z", "generator": { "date": "2022-03-04T08:38:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0715-1", "initial_release_date": "2022-03-04T08:38:26Z", "revision_history": [ { "date": "2022-03-04T08:38:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "corepack14-14.19.0-15.27.1.aarch64", "product": { "name": "corepack14-14.19.0-15.27.1.aarch64", "product_id": "corepack14-14.19.0-15.27.1.aarch64" } }, { "category": "product_version", "name": "nodejs14-14.19.0-15.27.1.aarch64", "product": { "name": "nodejs14-14.19.0-15.27.1.aarch64", "product_id": "nodejs14-14.19.0-15.27.1.aarch64" } }, { "category": "product_version", "name": "nodejs14-devel-14.19.0-15.27.1.aarch64", "product": { "name": "nodejs14-devel-14.19.0-15.27.1.aarch64", "product_id": "nodejs14-devel-14.19.0-15.27.1.aarch64" } }, { "category": "product_version", "name": "npm14-14.19.0-15.27.1.aarch64", "product": { "name": "npm14-14.19.0-15.27.1.aarch64", "product_id": "npm14-14.19.0-15.27.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "corepack14-14.19.0-15.27.1.i586", "product": { "name": "corepack14-14.19.0-15.27.1.i586", "product_id": "corepack14-14.19.0-15.27.1.i586" } }, { "category": "product_version", "name": "nodejs14-14.19.0-15.27.1.i586", "product": { "name": "nodejs14-14.19.0-15.27.1.i586", "product_id": "nodejs14-14.19.0-15.27.1.i586" } }, { "category": "product_version", "name": "nodejs14-devel-14.19.0-15.27.1.i586", "product": { "name": "nodejs14-devel-14.19.0-15.27.1.i586", "product_id": "nodejs14-devel-14.19.0-15.27.1.i586" } }, { "category": "product_version", "name": "npm14-14.19.0-15.27.1.i586", "product": { "name": "npm14-14.19.0-15.27.1.i586", "product_id": "npm14-14.19.0-15.27.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs14-docs-14.19.0-15.27.1.noarch", "product": { "name": "nodejs14-docs-14.19.0-15.27.1.noarch", "product_id": "nodejs14-docs-14.19.0-15.27.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "corepack14-14.19.0-15.27.1.ppc64le", "product": { "name": "corepack14-14.19.0-15.27.1.ppc64le", "product_id": "corepack14-14.19.0-15.27.1.ppc64le" } }, { "category": "product_version", "name": "nodejs14-14.19.0-15.27.1.ppc64le", "product": { "name": "nodejs14-14.19.0-15.27.1.ppc64le", "product_id": "nodejs14-14.19.0-15.27.1.ppc64le" } }, { "category": "product_version", "name": "nodejs14-devel-14.19.0-15.27.1.ppc64le", "product": { "name": "nodejs14-devel-14.19.0-15.27.1.ppc64le", "product_id": "nodejs14-devel-14.19.0-15.27.1.ppc64le" } }, { "category": "product_version", "name": "npm14-14.19.0-15.27.1.ppc64le", "product": { "name": "npm14-14.19.0-15.27.1.ppc64le", "product_id": "npm14-14.19.0-15.27.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "corepack14-14.19.0-15.27.1.s390x", "product": { "name": "corepack14-14.19.0-15.27.1.s390x", "product_id": "corepack14-14.19.0-15.27.1.s390x" } }, { "category": "product_version", "name": "nodejs14-14.19.0-15.27.1.s390x", "product": { "name": "nodejs14-14.19.0-15.27.1.s390x", "product_id": "nodejs14-14.19.0-15.27.1.s390x" } }, { "category": "product_version", "name": "nodejs14-devel-14.19.0-15.27.1.s390x", "product": { "name": "nodejs14-devel-14.19.0-15.27.1.s390x", "product_id": "nodejs14-devel-14.19.0-15.27.1.s390x" } }, { "category": "product_version", "name": "npm14-14.19.0-15.27.1.s390x", "product": { "name": "npm14-14.19.0-15.27.1.s390x", "product_id": "npm14-14.19.0-15.27.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "corepack14-14.19.0-15.27.1.x86_64", "product": { "name": "corepack14-14.19.0-15.27.1.x86_64", "product_id": "corepack14-14.19.0-15.27.1.x86_64" } }, { "category": "product_version", "name": "nodejs14-14.19.0-15.27.1.x86_64", "product": { "name": "nodejs14-14.19.0-15.27.1.x86_64", "product_id": "nodejs14-14.19.0-15.27.1.x86_64" } }, { "category": "product_version", "name": "nodejs14-devel-14.19.0-15.27.1.x86_64", "product": { "name": "nodejs14-devel-14.19.0-15.27.1.x86_64", "product_id": "nodejs14-devel-14.19.0-15.27.1.x86_64" } }, { "category": "product_version", "name": "npm14-14.19.0-15.27.1.x86_64", "product": { "name": "npm14-14.19.0-15.27.1.x86_64", "product_id": "npm14-14.19.0-15.27.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.1", "product": { "name": "SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Retail Branch Server 4.1", "product": { "name": "SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.1", "product": { "name": "SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.1" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7", "product": { "name": "SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.aarch64" }, "product_reference": "nodejs14-14.19.0-15.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.ppc64le" }, "product_reference": "nodejs14-14.19.0-15.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.s390x" }, "product_reference": "nodejs14-14.19.0-15.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.aarch64" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.ppc64le" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.s390x" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-docs-14.19.0-15.27.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.19.0-15.27.1.noarch" }, "product_reference": "nodejs14-docs-14.19.0-15.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.aarch64" }, "product_reference": "npm14-14.19.0-15.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.ppc64le" }, "product_reference": "npm14-14.19.0-15.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.s390x" }, "product_reference": "npm14-14.19.0-15.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.x86_64" }, "product_reference": "npm14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.aarch64" }, "product_reference": "nodejs14-14.19.0-15.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.aarch64" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-docs-14.19.0-15.27.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-docs-14.19.0-15.27.1.noarch" }, "product_reference": "nodejs14-docs-14.19.0-15.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.aarch64" }, "product_reference": "npm14-14.19.0-15.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.x86_64" }, "product_reference": "npm14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64" }, "product_reference": "nodejs14-14.19.0-15.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-docs-14.19.0-15.27.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch" }, "product_reference": "nodejs14-docs-14.19.0-15.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64" }, "product_reference": "npm14-14.19.0-15.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64" }, "product_reference": "npm14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-devel-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-docs-14.19.0-15.27.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-docs-14.19.0-15.27.1.noarch" }, "product_reference": "nodejs14-docs-14.19.0-15.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:npm14-14.19.0-15.27.1.x86_64" }, "product_reference": "npm14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64" }, "product_reference": "nodejs14-14.19.0-15.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.ppc64le" }, "product_reference": "nodejs14-14.19.0-15.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.s390x" }, "product_reference": "nodejs14-14.19.0-15.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.ppc64le" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.s390x" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-docs-14.19.0-15.27.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch" }, "product_reference": "nodejs14-docs-14.19.0-15.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64" }, "product_reference": "npm14-14.19.0-15.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.ppc64le" }, "product_reference": "npm14-14.19.0-15.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.s390x" }, "product_reference": "npm14-14.19.0-15.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64" }, "product_reference": "npm14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.ppc64le" }, "product_reference": "nodejs14-14.19.0-15.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.ppc64le" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-docs-14.19.0-15.27.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-docs-14.19.0-15.27.1.noarch" }, "product_reference": "nodejs14-docs-14.19.0-15.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.ppc64le" }, "product_reference": "npm14-14.19.0-15.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.x86_64" }, "product_reference": "npm14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:nodejs14-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-docs-14.19.0-15.27.1.noarch as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:nodejs14-docs-14.19.0-15.27.1.noarch" }, "product_reference": "nodejs14-docs-14.19.0-15.27.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:npm14-14.19.0-15.27.1.x86_64" }, "product_reference": "npm14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:nodejs14-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-docs-14.19.0-15.27.1.noarch as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch" }, "product_reference": "nodejs14-docs-14.19.0-15.27.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:npm14-14.19.0-15.27.1.x86_64" }, "product_reference": "npm14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.ppc64le" }, "product_reference": "nodejs14-14.19.0-15.27.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.s390x" }, "product_reference": "nodejs14-14.19.0-15.27.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.ppc64le" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.s390x" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-docs-14.19.0-15.27.1.noarch as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch" }, "product_reference": "nodejs14-docs-14.19.0-15.27.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.ppc64le" }, "product_reference": "npm14-14.19.0-15.27.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.s390x" }, "product_reference": "npm14-14.19.0-15.27.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.x86_64" }, "product_reference": "npm14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.aarch64" }, "product_reference": "nodejs14-14.19.0-15.27.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-14.19.0-15.27.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.aarch64" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-devel-14.19.0-15.27.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.x86_64" }, "product_reference": "nodejs14-devel-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs14-docs-14.19.0-15.27.1.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs14-docs-14.19.0-15.27.1.noarch" }, "product_reference": "nodejs14-docs-14.19.0-15.27.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.aarch64" }, "product_reference": "npm14-14.19.0-15.27.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "npm14-14.19.0-15.27.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.x86_64" }, "product_reference": "npm14-14.19.0-15.27.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-23343", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23343" } ], "notes": [ { "category": "general", "text": "All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Proxy 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23343", "url": "https://www.suse.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "SUSE Bug 1192153 for CVE-2021-23343", "url": "https://bugzilla.suse.com/1192153" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Proxy 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Proxy 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-04T08:38:26Z", "details": "moderate" } ], "title": "CVE-2021-23343" }, { "cve": "CVE-2021-32803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32803" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Proxy 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32803", "url": "https://www.suse.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191962" }, { "category": "external", "summary": "SUSE Bug 1191963 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Proxy 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Proxy 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-04T08:38:26Z", "details": "important" } ], "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32804" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Proxy 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32804", "url": "https://www.suse.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32804", "url": "https://bugzilla.suse.com/1191962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Proxy 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Proxy 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-04T08:38:26Z", "details": "important" } ], "title": "CVE-2021-32804" }, { "cve": "CVE-2021-3807", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3807" } ], "notes": [ { "category": "general", "text": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Proxy 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3807", "url": "https://www.suse.com/security/cve/CVE-2021-3807" }, { "category": "external", "summary": "SUSE Bug 1192154 for CVE-2021-3807", "url": "https://bugzilla.suse.com/1192154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Proxy 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Proxy 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-04T08:38:26Z", "details": "important" } ], "title": "CVE-2021-3807" }, { "cve": "CVE-2021-3918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3918" } ], "notes": [ { "category": "general", "text": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Proxy 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3918", "url": "https://www.suse.com/security/cve/CVE-2021-3918" }, { "category": "external", "summary": "SUSE Bug 1192696 for CVE-2021-3918", "url": "https://bugzilla.suse.com/1192696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Proxy 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Enterprise Storage 7:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.aarch64", "SUSE Enterprise Storage 7:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Proxy 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Proxy 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:nodejs14-devel-14.19.0-15.27.1.x86_64", "SUSE Manager Server 4.1:nodejs14-docs-14.19.0-15.27.1.noarch", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.ppc64le", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.s390x", "SUSE Manager Server 4.1:npm14-14.19.0-15.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-04T08:38:26Z", "details": "important" } ], "title": "CVE-2021-3918" } ] }
suse-su-2022:0570-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs10", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs10 fixes the following issues:\n\n- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153). \n- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963). \n- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962). \n- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).\n- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).\n- CVE-2022-21824: Fixed prototype pollution via console.table (bsc#1194514).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-570,SUSE-SLE-Module-Web-Scripting-12-2022-570", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0570-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0570-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220570-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0570-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010306.html" }, { "category": "self", "summary": "SUSE Bug 1191962", "url": "https://bugzilla.suse.com/1191962" }, { "category": "self", "summary": "SUSE Bug 1191963", "url": "https://bugzilla.suse.com/1191963" }, { "category": "self", "summary": "SUSE Bug 1192153", "url": "https://bugzilla.suse.com/1192153" }, { "category": "self", "summary": "SUSE Bug 1192154", "url": "https://bugzilla.suse.com/1192154" }, { "category": "self", "summary": "SUSE Bug 1192696", "url": "https://bugzilla.suse.com/1192696" }, { "category": "self", "summary": "SUSE Bug 1194514", "url": "https://bugzilla.suse.com/1194514" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23343 page", "url": "https://www.suse.com/security/cve/CVE-2021-23343/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32803 page", "url": "https://www.suse.com/security/cve/CVE-2021-32803/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32804 page", "url": "https://www.suse.com/security/cve/CVE-2021-32804/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3807 page", "url": "https://www.suse.com/security/cve/CVE-2021-3807/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3918 page", "url": "https://www.suse.com/security/cve/CVE-2021-3918/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21824 page", "url": "https://www.suse.com/security/cve/CVE-2022-21824/" } ], "title": "Security update for nodejs10", "tracking": { "current_release_date": "2022-02-24T09:35:40Z", "generator": { "date": "2022-02-24T09:35:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0570-1", "initial_release_date": "2022-02-24T09:35:40Z", "revision_history": [ { "date": "2022-02-24T09:35:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs10-10.24.1-1.46.1.aarch64", "product": { "name": "nodejs10-10.24.1-1.46.1.aarch64", "product_id": "nodejs10-10.24.1-1.46.1.aarch64" } }, { "category": "product_version", "name": "nodejs10-devel-10.24.1-1.46.1.aarch64", "product": { "name": "nodejs10-devel-10.24.1-1.46.1.aarch64", "product_id": "nodejs10-devel-10.24.1-1.46.1.aarch64" } }, { "category": "product_version", "name": "npm10-10.24.1-1.46.1.aarch64", "product": { "name": "npm10-10.24.1-1.46.1.aarch64", "product_id": "npm10-10.24.1-1.46.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.24.1-1.46.1.i586", "product": { "name": "nodejs10-10.24.1-1.46.1.i586", "product_id": "nodejs10-10.24.1-1.46.1.i586" } }, { "category": "product_version", "name": "nodejs10-devel-10.24.1-1.46.1.i586", "product": { "name": "nodejs10-devel-10.24.1-1.46.1.i586", "product_id": "nodejs10-devel-10.24.1-1.46.1.i586" } }, { "category": "product_version", "name": "npm10-10.24.1-1.46.1.i586", "product": { "name": "npm10-10.24.1-1.46.1.i586", "product_id": "npm10-10.24.1-1.46.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs10-docs-10.24.1-1.46.1.noarch", "product": { "name": "nodejs10-docs-10.24.1-1.46.1.noarch", "product_id": "nodejs10-docs-10.24.1-1.46.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.24.1-1.46.1.ppc64le", "product": { "name": "nodejs10-10.24.1-1.46.1.ppc64le", "product_id": "nodejs10-10.24.1-1.46.1.ppc64le" } }, { "category": "product_version", "name": "nodejs10-devel-10.24.1-1.46.1.ppc64le", "product": { "name": "nodejs10-devel-10.24.1-1.46.1.ppc64le", "product_id": "nodejs10-devel-10.24.1-1.46.1.ppc64le" } }, { "category": "product_version", "name": "npm10-10.24.1-1.46.1.ppc64le", "product": { "name": "npm10-10.24.1-1.46.1.ppc64le", "product_id": "npm10-10.24.1-1.46.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.24.1-1.46.1.s390", "product": { "name": "nodejs10-10.24.1-1.46.1.s390", "product_id": "nodejs10-10.24.1-1.46.1.s390" } }, { "category": "product_version", "name": "nodejs10-devel-10.24.1-1.46.1.s390", "product": { "name": "nodejs10-devel-10.24.1-1.46.1.s390", "product_id": "nodejs10-devel-10.24.1-1.46.1.s390" } }, { "category": "product_version", "name": "npm10-10.24.1-1.46.1.s390", "product": { "name": "npm10-10.24.1-1.46.1.s390", "product_id": "npm10-10.24.1-1.46.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.24.1-1.46.1.s390x", "product": { "name": "nodejs10-10.24.1-1.46.1.s390x", "product_id": "nodejs10-10.24.1-1.46.1.s390x" } }, { "category": "product_version", "name": "nodejs10-devel-10.24.1-1.46.1.s390x", "product": { "name": "nodejs10-devel-10.24.1-1.46.1.s390x", "product_id": "nodejs10-devel-10.24.1-1.46.1.s390x" } }, { "category": "product_version", "name": "npm10-10.24.1-1.46.1.s390x", "product": { "name": "npm10-10.24.1-1.46.1.s390x", "product_id": "npm10-10.24.1-1.46.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.24.1-1.46.1.x86_64", "product": { "name": "nodejs10-10.24.1-1.46.1.x86_64", "product_id": "nodejs10-10.24.1-1.46.1.x86_64" } }, { "category": "product_version", "name": "nodejs10-devel-10.24.1-1.46.1.x86_64", "product": { "name": "nodejs10-devel-10.24.1-1.46.1.x86_64", "product_id": "nodejs10-devel-10.24.1-1.46.1.x86_64" } }, { "category": "product_version", "name": "npm10-10.24.1-1.46.1.x86_64", "product": { "name": "npm10-10.24.1-1.46.1.x86_64", "product_id": "npm10-10.24.1-1.46.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 12", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-1.46.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.aarch64" }, "product_reference": "nodejs10-10.24.1-1.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-1.46.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.ppc64le" }, "product_reference": "nodejs10-10.24.1-1.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-1.46.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.s390x" }, "product_reference": "nodejs10-10.24.1-1.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-1.46.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.x86_64" }, "product_reference": "nodejs10-10.24.1-1.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-1.46.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.aarch64" }, "product_reference": "nodejs10-devel-10.24.1-1.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-1.46.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.ppc64le" }, "product_reference": "nodejs10-devel-10.24.1-1.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-1.46.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.s390x" }, "product_reference": "nodejs10-devel-10.24.1-1.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-1.46.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-1.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-1.46.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.46.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-1.46.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-1.46.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.aarch64" }, "product_reference": "npm10-10.24.1-1.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-1.46.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.ppc64le" }, "product_reference": "npm10-10.24.1-1.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-1.46.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.s390x" }, "product_reference": "npm10-10.24.1-1.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-1.46.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.x86_64" }, "product_reference": "npm10-10.24.1-1.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-23343", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23343" } ], "notes": [ { "category": "general", "text": "All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.46.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23343", "url": "https://www.suse.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "SUSE Bug 1192153 for CVE-2021-23343", "url": "https://bugzilla.suse.com/1192153" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.46.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.46.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-24T09:35:40Z", "details": "moderate" } ], "title": "CVE-2021-23343" }, { "cve": "CVE-2021-32803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32803" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.46.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32803", "url": "https://www.suse.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191962" }, { "category": "external", "summary": "SUSE Bug 1191963 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.46.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.46.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-24T09:35:40Z", "details": "important" } ], "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32804" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.46.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32804", "url": "https://www.suse.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32804", "url": "https://bugzilla.suse.com/1191962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.46.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.46.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-24T09:35:40Z", "details": "important" } ], "title": "CVE-2021-32804" }, { "cve": "CVE-2021-3807", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3807" } ], "notes": [ { "category": "general", "text": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.46.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3807", "url": "https://www.suse.com/security/cve/CVE-2021-3807" }, { "category": "external", "summary": "SUSE Bug 1192154 for CVE-2021-3807", "url": "https://bugzilla.suse.com/1192154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.46.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.46.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-24T09:35:40Z", "details": "important" } ], "title": "CVE-2021-3807" }, { "cve": "CVE-2021-3918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3918" } ], "notes": [ { "category": "general", "text": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.46.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3918", "url": "https://www.suse.com/security/cve/CVE-2021-3918" }, { "category": "external", "summary": "SUSE Bug 1192696 for CVE-2021-3918", "url": "https://bugzilla.suse.com/1192696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.46.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.46.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-24T09:35:40Z", "details": "important" } ], "title": "CVE-2021-3918" }, { "cve": "CVE-2022-21824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21824" } ], "notes": [ { "category": "general", "text": "Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js \u003e= 12.22.9, \u003e= 14.18.3, \u003e= 16.13.2, and \u003e= 17.3.1 use a null protoype for the object these properties are being assigned to.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.46.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21824", "url": "https://www.suse.com/security/cve/CVE-2022-21824" }, { "category": "external", "summary": "SUSE Bug 1194514 for CVE-2022-21824", "url": "https://bugzilla.suse.com/1194514" }, { "category": "external", "summary": "SUSE Bug 1202688 for CVE-2022-21824", "url": "https://bugzilla.suse.com/1202688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.46.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.46.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.46.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-24T09:35:40Z", "details": "moderate" } ], "title": "CVE-2022-21824" } ] }
suse-su-2022:1717-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs10", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs10 fixes the following issues:\n\n- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).\n- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).\n- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).\n- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).\n- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).\n- CVE-2022-21824: Fixed prototype pollution via console.table (bsc#1194514).\n- CVE-2021-44906: Fixed prototype pollution in npm dependency (bsc#1198247).\n- CVE-2021-44907: Fixed insuficient sanitation in npm dependency (bsc#1197283).\n- CVE-2022-0235: Fixed passing of cookie data and sensitive headers to different hostnames in node-fetch-npm (bsc#1194819).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-1717,SUSE-SLE-Product-HPC-15-2022-1717,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1717,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1717,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1717,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1717,SUSE-SLE-Product-SLES-15-2022-1717,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1717,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1717,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1717,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1717,SUSE-SLE-Product-SLES_SAP-15-2022-1717,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1717,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1717,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1717,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1717,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1717,SUSE-Storage-6-2022-1717,SUSE-Storage-7-2022-1717,openSUSE-SLE-15.3-2022-1717,openSUSE-SLE-15.4-2022-1717", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1717-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:1717-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221717-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:1717-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011058.html" }, { "category": "self", "summary": "SUSE Bug 1191962", "url": "https://bugzilla.suse.com/1191962" }, { "category": "self", "summary": "SUSE Bug 1191963", "url": "https://bugzilla.suse.com/1191963" }, { "category": "self", "summary": "SUSE Bug 1192153", "url": "https://bugzilla.suse.com/1192153" }, { "category": "self", "summary": "SUSE Bug 1192154", "url": "https://bugzilla.suse.com/1192154" }, { "category": "self", "summary": "SUSE Bug 1192696", "url": "https://bugzilla.suse.com/1192696" }, { "category": "self", "summary": "SUSE Bug 1194514", "url": "https://bugzilla.suse.com/1194514" }, { "category": "self", "summary": "SUSE Bug 1194819", "url": "https://bugzilla.suse.com/1194819" }, { "category": "self", "summary": "SUSE Bug 1197283", "url": "https://bugzilla.suse.com/1197283" }, { "category": "self", "summary": "SUSE Bug 1198247", "url": "https://bugzilla.suse.com/1198247" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23343 page", "url": "https://www.suse.com/security/cve/CVE-2021-23343/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32803 page", "url": "https://www.suse.com/security/cve/CVE-2021-32803/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32804 page", "url": "https://www.suse.com/security/cve/CVE-2021-32804/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3807 page", "url": "https://www.suse.com/security/cve/CVE-2021-3807/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3918 page", "url": "https://www.suse.com/security/cve/CVE-2021-3918/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44906 page", "url": "https://www.suse.com/security/cve/CVE-2021-44906/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44907 page", "url": "https://www.suse.com/security/cve/CVE-2021-44907/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0235 page", "url": "https://www.suse.com/security/cve/CVE-2022-0235/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21824 page", "url": "https://www.suse.com/security/cve/CVE-2022-21824/" } ], "title": "Security update for nodejs10", "tracking": { "current_release_date": "2022-05-17T15:43:16Z", "generator": { "date": "2022-05-17T15:43:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:1717-1", "initial_release_date": "2022-05-17T15:43:16Z", "revision_history": [ { "date": "2022-05-17T15:43:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs10-10.24.1-150000.1.44.1.aarch64", "product": { "name": "nodejs10-10.24.1-150000.1.44.1.aarch64", "product_id": "nodejs10-10.24.1-150000.1.44.1.aarch64" } }, { "category": "product_version", "name": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "product": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "product_id": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64" } }, { "category": "product_version", "name": "npm10-10.24.1-150000.1.44.1.aarch64", "product": { "name": "npm10-10.24.1-150000.1.44.1.aarch64", "product_id": "npm10-10.24.1-150000.1.44.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.24.1-150000.1.44.1.i586", "product": { "name": "nodejs10-10.24.1-150000.1.44.1.i586", "product_id": "nodejs10-10.24.1-150000.1.44.1.i586" } }, { "category": "product_version", "name": "nodejs10-devel-10.24.1-150000.1.44.1.i586", "product": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.i586", "product_id": "nodejs10-devel-10.24.1-150000.1.44.1.i586" } }, { "category": "product_version", "name": "npm10-10.24.1-150000.1.44.1.i586", "product": { "name": "npm10-10.24.1-150000.1.44.1.i586", "product_id": "npm10-10.24.1-150000.1.44.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "product": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "product_id": "nodejs10-docs-10.24.1-150000.1.44.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.24.1-150000.1.44.1.ppc64le", "product": { "name": "nodejs10-10.24.1-150000.1.44.1.ppc64le", "product_id": "nodejs10-10.24.1-150000.1.44.1.ppc64le" } }, { "category": "product_version", "name": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "product": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "product_id": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le" } }, { "category": "product_version", "name": "npm10-10.24.1-150000.1.44.1.ppc64le", "product": { "name": "npm10-10.24.1-150000.1.44.1.ppc64le", "product_id": "npm10-10.24.1-150000.1.44.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.24.1-150000.1.44.1.s390x", "product": { "name": "nodejs10-10.24.1-150000.1.44.1.s390x", "product_id": "nodejs10-10.24.1-150000.1.44.1.s390x" } }, { "category": "product_version", "name": "nodejs10-devel-10.24.1-150000.1.44.1.s390x", "product": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.s390x", "product_id": "nodejs10-devel-10.24.1-150000.1.44.1.s390x" } }, { "category": "product_version", "name": "npm10-10.24.1-150000.1.44.1.s390x", "product": { "name": "npm10-10.24.1-150000.1.44.1.s390x", "product_id": "npm10-10.24.1-150000.1.44.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.24.1-150000.1.44.1.x86_64", "product": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64", "product_id": "nodejs10-10.24.1-150000.1.44.1.x86_64" } }, { "category": "product_version", "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "product": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "product_id": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64" } }, { "category": "product_version", "name": "npm10-10.24.1-150000.1.44.1.x86_64", "product": { "name": "npm10-10.24.1-150000.1.44.1.x86_64", "product_id": "npm10-10.24.1-150000.1.44.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.1", "product": { "name": "SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Retail Branch Server 4.1", "product": { "name": "SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.1", "product": { "name": "SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.1" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 6", "product": { "name": "SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:6" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7", "product": { "name": "SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7" } } }, { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "npm10-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x" }, "product_reference": "npm10-10.24.1-150000.1.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "npm10-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x" }, "product_reference": "npm10-10.24.1-150000.1.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "npm10-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x" }, "product_reference": "npm10-10.24.1-150000.1.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "npm10-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "npm10-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "npm10-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "npm10-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x" }, "product_reference": "npm10-10.24.1-150000.1.44.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "npm10-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x" }, "product_reference": "npm10-10.24.1-150000.1.44.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.24.1-150000.1.44.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.24.1-150000.1.44.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch" }, "product_reference": "nodejs10-docs-10.24.1-150000.1.44.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le" }, "product_reference": "npm10-10.24.1-150000.1.44.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x" }, "product_reference": "npm10-10.24.1-150000.1.44.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.24.1-150000.1.44.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" }, "product_reference": "npm10-10.24.1-150000.1.44.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-23343", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23343" } ], "notes": [ { "category": "general", "text": "All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23343", "url": "https://www.suse.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "SUSE Bug 1192153 for CVE-2021-23343", "url": "https://bugzilla.suse.com/1192153" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-05-17T15:43:16Z", "details": "moderate" } ], "title": "CVE-2021-23343" }, { "cve": "CVE-2021-32803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32803" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32803", "url": "https://www.suse.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191962" }, { "category": "external", "summary": "SUSE Bug 1191963 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-05-17T15:43:16Z", "details": "important" } ], "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32804" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32804", "url": "https://www.suse.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32804", "url": "https://bugzilla.suse.com/1191962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-05-17T15:43:16Z", "details": "important" } ], "title": "CVE-2021-32804" }, { "cve": "CVE-2021-3807", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3807" } ], "notes": [ { "category": "general", "text": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3807", "url": "https://www.suse.com/security/cve/CVE-2021-3807" }, { "category": "external", "summary": "SUSE Bug 1192154 for CVE-2021-3807", "url": "https://bugzilla.suse.com/1192154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-05-17T15:43:16Z", "details": "important" } ], "title": "CVE-2021-3807" }, { "cve": "CVE-2021-3918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3918" } ], "notes": [ { "category": "general", "text": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3918", "url": "https://www.suse.com/security/cve/CVE-2021-3918" }, { "category": "external", "summary": "SUSE Bug 1192696 for CVE-2021-3918", "url": "https://bugzilla.suse.com/1192696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-05-17T15:43:16Z", "details": "important" } ], "title": "CVE-2021-3918" }, { "cve": "CVE-2021-44906", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44906" } ], "notes": [ { "category": "general", "text": "Minimist \u003c=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44906", "url": "https://www.suse.com/security/cve/CVE-2021-44906" }, { "category": "external", "summary": "SUSE Bug 1198247 for CVE-2021-44906", "url": "https://bugzilla.suse.com/1198247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-05-17T15:43:16Z", "details": "moderate" } ], "title": "CVE-2021-44906" }, { "cve": "CVE-2021-44907", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44907" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44907", "url": "https://www.suse.com/security/cve/CVE-2021-44907" }, { "category": "external", "summary": "SUSE Bug 1197283 for CVE-2021-44907", "url": "https://bugzilla.suse.com/1197283" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-05-17T15:43:16Z", "details": "low" } ], "title": "CVE-2021-44907" }, { "cve": "CVE-2022-0235", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0235" } ], "notes": [ { "category": "general", "text": "node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0235", "url": "https://www.suse.com/security/cve/CVE-2022-0235" }, { "category": "external", "summary": "SUSE Bug 1194819 for CVE-2022-0235", "url": "https://bugzilla.suse.com/1194819" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-05-17T15:43:16Z", "details": "moderate" } ], "title": "CVE-2022-0235" }, { "cve": "CVE-2022-21824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21824" } ], "notes": [ { "category": "general", "text": "Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js \u003e= 12.22.9, \u003e= 14.18.3, \u003e= 16.13.2, and \u003e= 17.3.1 use a null protoype for the object these properties are being assigned to.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21824", "url": "https://www.suse.com/security/cve/CVE-2022-21824" }, { "category": "external", "summary": "SUSE Bug 1194514 for CVE-2022-21824", "url": "https://bugzilla.suse.com/1194514" }, { "category": "external", "summary": "SUSE Bug 1202688 for CVE-2022-21824", "url": "https://bugzilla.suse.com/1202688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.44.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.44.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-05-17T15:43:16Z", "details": "moderate" } ], "title": "CVE-2022-21824" } ] }
suse-su-2022:0657-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs12", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs12 fixes the following issues:\n\t \n- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).\n- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).\n- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).\n- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).\n- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-657,SUSE-SLE-Module-Web-Scripting-15-SP3-2022-657,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-657,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-657,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-657,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-657,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-657,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-657,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-657,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-657,SUSE-Storage-7-2022-657", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0657-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0657-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220657-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0657-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010326.html" }, { "category": "self", "summary": "SUSE Bug 1191962", "url": "https://bugzilla.suse.com/1191962" }, { "category": "self", "summary": "SUSE Bug 1191963", "url": "https://bugzilla.suse.com/1191963" }, { "category": "self", "summary": "SUSE Bug 1192153", "url": "https://bugzilla.suse.com/1192153" }, { "category": "self", "summary": "SUSE Bug 1192154", "url": "https://bugzilla.suse.com/1192154" }, { "category": "self", "summary": "SUSE Bug 1192696", "url": "https://bugzilla.suse.com/1192696" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23343 page", "url": "https://www.suse.com/security/cve/CVE-2021-23343/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32803 page", "url": "https://www.suse.com/security/cve/CVE-2021-32803/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32804 page", "url": "https://www.suse.com/security/cve/CVE-2021-32804/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3807 page", "url": "https://www.suse.com/security/cve/CVE-2021-3807/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3918 page", "url": "https://www.suse.com/security/cve/CVE-2021-3918/" } ], "title": "Security update for nodejs12", "tracking": { "current_release_date": "2022-03-02T09:12:22Z", "generator": { "date": "2022-03-02T09:12:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0657-1", "initial_release_date": "2022-03-02T09:12:22Z", "revision_history": [ { "date": "2022-03-02T09:12:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs12-12.22.10-4.29.3.aarch64", "product": { "name": "nodejs12-12.22.10-4.29.3.aarch64", "product_id": "nodejs12-12.22.10-4.29.3.aarch64" } }, { "category": "product_version", "name": "nodejs12-devel-12.22.10-4.29.3.aarch64", "product": { "name": "nodejs12-devel-12.22.10-4.29.3.aarch64", "product_id": "nodejs12-devel-12.22.10-4.29.3.aarch64" } }, { "category": "product_version", "name": "npm12-12.22.10-4.29.3.aarch64", "product": { "name": "npm12-12.22.10-4.29.3.aarch64", "product_id": "npm12-12.22.10-4.29.3.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.22.10-4.29.3.i586", "product": { "name": "nodejs12-12.22.10-4.29.3.i586", "product_id": "nodejs12-12.22.10-4.29.3.i586" } }, { "category": "product_version", "name": "nodejs12-devel-12.22.10-4.29.3.i586", "product": { "name": "nodejs12-devel-12.22.10-4.29.3.i586", "product_id": "nodejs12-devel-12.22.10-4.29.3.i586" } }, { "category": "product_version", "name": "npm12-12.22.10-4.29.3.i586", "product": { "name": "npm12-12.22.10-4.29.3.i586", "product_id": "npm12-12.22.10-4.29.3.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs12-docs-12.22.10-4.29.3.noarch", "product": { "name": "nodejs12-docs-12.22.10-4.29.3.noarch", "product_id": "nodejs12-docs-12.22.10-4.29.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.22.10-4.29.3.ppc64le", "product": { "name": "nodejs12-12.22.10-4.29.3.ppc64le", "product_id": "nodejs12-12.22.10-4.29.3.ppc64le" } }, { "category": "product_version", "name": "nodejs12-devel-12.22.10-4.29.3.ppc64le", "product": { "name": "nodejs12-devel-12.22.10-4.29.3.ppc64le", "product_id": "nodejs12-devel-12.22.10-4.29.3.ppc64le" } }, { "category": "product_version", "name": "npm12-12.22.10-4.29.3.ppc64le", "product": { "name": "npm12-12.22.10-4.29.3.ppc64le", "product_id": "npm12-12.22.10-4.29.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.22.10-4.29.3.s390x", "product": { "name": "nodejs12-12.22.10-4.29.3.s390x", "product_id": "nodejs12-12.22.10-4.29.3.s390x" } }, { "category": "product_version", "name": "nodejs12-devel-12.22.10-4.29.3.s390x", "product": { "name": "nodejs12-devel-12.22.10-4.29.3.s390x", "product_id": "nodejs12-devel-12.22.10-4.29.3.s390x" } }, { "category": "product_version", "name": "npm12-12.22.10-4.29.3.s390x", "product": { "name": "npm12-12.22.10-4.29.3.s390x", "product_id": "npm12-12.22.10-4.29.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.22.10-4.29.3.x86_64", "product": { "name": "nodejs12-12.22.10-4.29.3.x86_64", "product_id": "nodejs12-12.22.10-4.29.3.x86_64" } }, { "category": "product_version", "name": "nodejs12-devel-12.22.10-4.29.3.x86_64", "product": { "name": "nodejs12-devel-12.22.10-4.29.3.x86_64", "product_id": "nodejs12-devel-12.22.10-4.29.3.x86_64" } }, { "category": "product_version", "name": "npm12-12.22.10-4.29.3.x86_64", "product": { "name": "npm12-12.22.10-4.29.3.x86_64", "product_id": "npm12-12.22.10-4.29.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.1", "product": { "name": "SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Retail Branch Server 4.1", "product": { "name": "SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.1", "product": { "name": "SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.1" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7", "product": { "name": "SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.aarch64" }, "product_reference": "nodejs12-12.22.10-4.29.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.ppc64le" }, "product_reference": "nodejs12-12.22.10-4.29.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.s390x" }, "product_reference": "nodejs12-12.22.10-4.29.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.aarch64" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.ppc64le" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.s390x" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-docs-12.22.10-4.29.3.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.10-4.29.3.noarch" }, "product_reference": "nodejs12-docs-12.22.10-4.29.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.aarch64" }, "product_reference": "npm12-12.22.10-4.29.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.ppc64le" }, "product_reference": "npm12-12.22.10-4.29.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.s390x" }, "product_reference": "npm12-12.22.10-4.29.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.x86_64" }, "product_reference": "npm12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.aarch64" }, "product_reference": "nodejs12-12.22.10-4.29.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.aarch64" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-docs-12.22.10-4.29.3.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-docs-12.22.10-4.29.3.noarch" }, "product_reference": "nodejs12-docs-12.22.10-4.29.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.aarch64" }, "product_reference": "npm12-12.22.10-4.29.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.x86_64" }, "product_reference": "npm12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64" }, "product_reference": "nodejs12-12.22.10-4.29.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-docs-12.22.10-4.29.3.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch" }, "product_reference": "nodejs12-docs-12.22.10-4.29.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64" }, "product_reference": "npm12-12.22.10-4.29.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64" }, "product_reference": "npm12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-devel-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-docs-12.22.10-4.29.3.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-docs-12.22.10-4.29.3.noarch" }, "product_reference": "nodejs12-docs-12.22.10-4.29.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:npm12-12.22.10-4.29.3.x86_64" }, "product_reference": "npm12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64" }, "product_reference": "nodejs12-12.22.10-4.29.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.ppc64le" }, "product_reference": "nodejs12-12.22.10-4.29.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.s390x" }, "product_reference": "nodejs12-12.22.10-4.29.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.ppc64le" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.s390x" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-docs-12.22.10-4.29.3.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch" }, "product_reference": "nodejs12-docs-12.22.10-4.29.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64" }, "product_reference": "npm12-12.22.10-4.29.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.ppc64le" }, "product_reference": "npm12-12.22.10-4.29.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.s390x" }, "product_reference": "npm12-12.22.10-4.29.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64" }, "product_reference": "npm12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.ppc64le" }, "product_reference": "nodejs12-12.22.10-4.29.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.ppc64le" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-docs-12.22.10-4.29.3.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-docs-12.22.10-4.29.3.noarch" }, "product_reference": "nodejs12-docs-12.22.10-4.29.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.ppc64le" }, "product_reference": "npm12-12.22.10-4.29.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.x86_64" }, "product_reference": "npm12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:nodejs12-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-docs-12.22.10-4.29.3.noarch as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:nodejs12-docs-12.22.10-4.29.3.noarch" }, "product_reference": "nodejs12-docs-12.22.10-4.29.3.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:npm12-12.22.10-4.29.3.x86_64" }, "product_reference": "npm12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:nodejs12-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-docs-12.22.10-4.29.3.noarch as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch" }, "product_reference": "nodejs12-docs-12.22.10-4.29.3.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:npm12-12.22.10-4.29.3.x86_64" }, "product_reference": "npm12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.ppc64le" }, "product_reference": "nodejs12-12.22.10-4.29.3.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.s390x" }, "product_reference": "nodejs12-12.22.10-4.29.3.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.ppc64le" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.s390x" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-docs-12.22.10-4.29.3.noarch as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch" }, "product_reference": "nodejs12-docs-12.22.10-4.29.3.noarch", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.ppc64le" }, "product_reference": "npm12-12.22.10-4.29.3.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.s390x" }, "product_reference": "npm12-12.22.10-4.29.3.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.x86_64" }, "product_reference": "npm12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.aarch64" }, "product_reference": "nodejs12-12.22.10-4.29.3.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.22.10-4.29.3.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.aarch64" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.22.10-4.29.3.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.x86_64" }, "product_reference": "nodejs12-devel-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-docs-12.22.10-4.29.3.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:nodejs12-docs-12.22.10-4.29.3.noarch" }, "product_reference": "nodejs12-docs-12.22.10-4.29.3.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.aarch64" }, "product_reference": "npm12-12.22.10-4.29.3.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.22.10-4.29.3.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.x86_64" }, "product_reference": "npm12-12.22.10-4.29.3.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-23343", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23343" } ], "notes": [ { "category": "general", "text": "All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Proxy 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Retail Branch Server 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23343", "url": "https://www.suse.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "SUSE Bug 1192153 for CVE-2021-23343", "url": "https://bugzilla.suse.com/1192153" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Proxy 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Retail Branch Server 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Proxy 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Retail Branch Server 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-02T09:12:22Z", "details": "moderate" } ], "title": "CVE-2021-23343" }, { "cve": "CVE-2021-32803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32803" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Proxy 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Retail Branch Server 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32803", "url": "https://www.suse.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191962" }, { "category": "external", "summary": "SUSE Bug 1191963 for CVE-2021-32803", "url": "https://bugzilla.suse.com/1191963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Proxy 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Retail Branch Server 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Proxy 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Retail Branch Server 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-02T09:12:22Z", "details": "important" } ], "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32804" } ], "notes": [ { "category": "general", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Proxy 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Retail Branch Server 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32804", "url": "https://www.suse.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "SUSE Bug 1191962 for CVE-2021-32804", "url": "https://bugzilla.suse.com/1191962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Proxy 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Retail Branch Server 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Proxy 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Retail Branch Server 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-02T09:12:22Z", "details": "important" } ], "title": "CVE-2021-32804" }, { "cve": "CVE-2021-3807", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3807" } ], "notes": [ { "category": "general", "text": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Proxy 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Retail Branch Server 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3807", "url": "https://www.suse.com/security/cve/CVE-2021-3807" }, { "category": "external", "summary": "SUSE Bug 1192154 for CVE-2021-3807", "url": "https://bugzilla.suse.com/1192154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Proxy 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Retail Branch Server 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Proxy 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Retail Branch Server 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-02T09:12:22Z", "details": "important" } ], "title": "CVE-2021-3807" }, { "cve": "CVE-2021-3918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3918" } ], "notes": [ { "category": "general", "text": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Proxy 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Retail Branch Server 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3918", "url": "https://www.suse.com/security/cve/CVE-2021-3918" }, { "category": "external", "summary": "SUSE Bug 1192696 for CVE-2021-3918", "url": "https://bugzilla.suse.com/1192696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Proxy 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Retail Branch Server 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Enterprise Storage 7:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.aarch64", "SUSE Enterprise Storage 7:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Proxy 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Proxy 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Retail Branch Server 4.1:npm12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:nodejs12-devel-12.22.10-4.29.3.x86_64", "SUSE Manager Server 4.1:nodejs12-docs-12.22.10-4.29.3.noarch", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.ppc64le", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.s390x", "SUSE Manager Server 4.1:npm12-12.22.10-4.29.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-02T09:12:22Z", "details": "important" } ], "title": "CVE-2021-3918" } ] }
rhsa-2021:3280
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.17.5).\n\nSecurity Fix(es):\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)\n\n* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)\n\n* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)\n\n* nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)\n\n* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)\n\n* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)\n\n* nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)\n\n* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3280", "url": "https://access.redhat.com/errata/RHSA-2021:3280" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "1945459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945459" }, { "category": "external", "summary": "1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3280.json" } ], "title": "Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update", "tracking": { "current_release_date": "2025-08-04T01:57:40+00:00", "generator": { "date": "2025-08-04T01:57:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:3280", "initial_release_date": "2021-08-26T10:21:32+00:00", "revision_history": [ { "date": "2021-08-26T10:21:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-26T10:21:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T01:57:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "product": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "product_id": "rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs@14.17.5-1.el7?arch=src" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "product": { "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "product_id": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-5.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "product": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "product_id": "rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs@14.17.5-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "product": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "product_id": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.17.5-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "product": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "product_id": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-npm@6.14.14-14.17.5.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "product": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "product_id": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.17.5-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "product": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "product_id": "rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs@14.17.5-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "product": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "product_id": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.17.5-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "product": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "product_id": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-npm@6.14.14-14.17.5.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "product": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "product_id": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.17.5-1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "product": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "product_id": "rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs@14.17.5-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "product": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "product_id": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.17.5-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "product": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "product_id": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-npm@6.14.14-14.17.5.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "product": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "product_id": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.17.5-1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "product": { "name": "rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "product_id": "rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-docs@14.17.5-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "product": { "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "product_id": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-5.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" }, "product_reference": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le" }, "product_reference": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x" }, "product_reference": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" }, "product_reference": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" }, "product_reference": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le" }, "product_reference": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x" }, "product_reference": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" }, "product_reference": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" }, "product_reference": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le" }, "product_reference": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x" }, "product_reference": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" }, "product_reference": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.7" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7788", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-12-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1907444" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ini: Prototype pollution via malicious INI file", "title": "Vulnerability summary" }, { "category": "other", "text": "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7788" }, { "category": "external", "summary": "RHBZ#1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7788", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788" } ], "release_date": "2020-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ini: Prototype pollution via malicious INI file" }, { "cve": "CVE-2020-28469", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945459" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-glob-parent. The enclosure regex used to check for glob enclosures containing backslashes is vulnerable to Regular Expression Denial of Service attacks. This flaw allows an attacker to cause a denial of service if they can supply a malicious string to the glob-parent function. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-glob-parent: Regular expression denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "While some components do package a vulnerable version of glob-parent, access to them requires OpenShift OAuth credentials and hence have been marked with a Low impact. This applies to the following products:\n - OpenShift Container Platform (OCP)\n - OpenShift ServiceMesh (OSSM)\n - Red Hat Advanced Cluster Management for Kubernetes (RHACM)\n - OpenShift distributed tracing", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28469" }, { "category": "external", "summary": "RHBZ#1945459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945459" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28469", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28469" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28469" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", "url": "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905" } ], "release_date": "2021-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-glob-parent: Regular expression denial of service" }, { "cve": "CVE-2021-3672", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988342" } ], "notes": [ { "category": "description", "text": "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "c-ares: Missing input validation of host names may lead to domain hijacking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3672" }, { "category": "external", "summary": "RHBZ#1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3672", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672" }, { "category": "external", "summary": "https://c-ares.haxx.se/adv_20210810.html", "url": "https://c-ares.haxx.se/adv_20210810.html" } ], "release_date": "2021-08-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "c-ares: Missing input validation of host names may lead to domain hijacking" }, { "cve": "CVE-2021-22930", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988394" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit the memory corruption, which causes a change in the process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22930" }, { "category": "external", "summary": "RHBZ#1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22930", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22930" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930" } ], "release_date": "2021-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-22931", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993019" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. These vulnerabilities include remote code execution, Cross-site scripting (XSS), application crashes due to missing input validation of hostnames returned by Domain Name Servers in the Node.js DNS library, which can lead to the output of wrong hostnames (leading to Domain hijacking) and injection vulnerabilities in applications using the library.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Improper handling of untypical characters in domain names", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22931" }, { "category": "external", "summary": "RHBZ#1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22931", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22931" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Improper handling of untypical characters in domain names" }, { "cve": "CVE-2021-22939", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993039" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. If the Node.js HTTPS API is used incorrectly and \"undefined\" is passed for the \"rejectUnauthorized\" parameter, no error is returned, and the connections to servers with an expired certificate are accepted. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Incomplete validation of tls rejectUnauthorized parameter", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22939" }, { "category": "external", "summary": "RHBZ#1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22939", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Incomplete validation of tls rejectUnauthorized parameter" }, { "cve": "CVE-2021-22940", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-08-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993029" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit memory corruption to change process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is a follow-up to CVE-2021-22930, as the issue was not completely resolved in the fix for CVE-2021-22930. Node.js as shipped in Red Hat Enterprise Linux 8 streams and Red Hat Software Collections is not explicitly affected by the incomplete fix because the incomplete fix was not released, but the original issue does affect these components.\n\nRed Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22940" }, { "category": "external", "summary": "RHBZ#1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22940", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-23343", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956818" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-path-parse. All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Had Quay , whilst a vulnerable version of `path-parse` is included in the quay-rhel8 container it is a development dependency only, hence the impact by this vulnerability is low.\n\nIn OpenShift Container Platform (OCP), the hadoop component which is a part of the OCP metering stack, ships the vulnerable version of \u0027path-parse\u0027.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected component is marked as wontfix.\nThis may be fixed in the future.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of `path-parse`, however the vulnerable functionality is currently not used in any part of the product.\n\nIn Red Hat Virtualization cockpit-ovirt, ovirt-engine-ui-extensions and ovirt-web-ui use vulnerable version of `path-parse`, however for cockpit-ovirt it is a development time dependency only, and for ovirt-engine-ui-extensions and ovirt-web-ui the vulnerable functions are never used.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "RHBZ#1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23343", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067", "url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067" } ], "release_date": "2021-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" } ] }
rhsa-2021:4618
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.4.0 General\nAvailability release images, which fix several bugs and security issues.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.4.0 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in.\n\nThis advisory contains the container images for Red Hat Advanced Cluster\nManagement for Kubernetes, which fix several bugs and security issues. See\nthe following Release Notes documentation, which will be updated shortly\nfor this release, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana\ngement_for_kubernetes/2.4/html/release_notes/\n\nSecurity fixes: \n\n* CVE-2021-33623: nodejs-trim-newlines: ReDoS in .end() method\n\n* CVE-2021-32626: redis: Lua scripts can overflow the heap-based Lua stack\n\n* CVE-2021-32627: redis: Integer overflow issue with Streams\n\n* CVE-2021-32628: redis: Integer overflow bug in the ziplist data structure\n\n* CVE-2021-32672: redis: Out of bounds read in lua debugger protocol parser\n\n* CVE-2021-32675: redis: Denial of service via Redis Standard Protocol (RESP) request\n\n* CVE-2021-32687: redis: Integer overflow issue with intsets\n\n* CVE-2021-32690: helm: information disclosure vulnerability\n\n* CVE-2021-32803: nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite\n\n* CVE-2021-32804: nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite\n\n* CVE-2021-23017: nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name\n\n* CVE-2021-3711: openssl: SM2 Decryption Buffer Overflow\n\n* CVE-2021-3712: openssl: Read buffer overruns processing ASN.1 strings\n\n* CVE-2021-3749: nodejs-axios: Regular expression denial of service in trim function\n\n* CVE-2021-41099: redis: Integer overflow issue with strings\n\nBug fixes:\n\n* RFE ACM Application management UI doesn\u0027t reflect object status (Bugzilla #1965321)\n\n* RHACM 2.4 files (Bugzilla #1983663)\n\n* Hive Operator CrashLoopBackOff when deploying ACM with latest downstream 2.4 (Bugzilla #1993366)\n\n* submariner-addon pod failing in RHACM 2.4 latest ds snapshot (Bugzilla #1994668)\n\n* ACM 2.4 install on OCP 4.9 ipv6 disconnected hub fails due to multicluster pod in clb (Bugzilla #2000274)\n\n* pre-network-manager-config failed due to timeout when static config is used (Bugzilla #2003915)\n\n* InfraEnv condition does not reflect the actual error message (Bugzilla #2009204, 2010030)\n\n* Flaky test point to a nil pointer conditions list (Bugzilla #2010175)\n\n* InfraEnv status shows \u0027Failed to create image: internal error (Bugzilla #2010272)\n\n* subctl diagnose firewall intra-cluster - failed VXLAN checks (Bugzilla #2013157)\n\n* pre-network-manager-config failed due to timeout when static config is used (Bugzilla #2014084)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4618", "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1963121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1963121" }, { "category": "external", "summary": "1965321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965321" }, { "category": "external", "summary": "1966615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966615" }, { "category": "external", "summary": "1978144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978144" }, { "category": "external", "summary": "1983663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983663" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1994668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994668" }, { "category": "external", "summary": "1995623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995623" }, { "category": "external", "summary": "1995634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634" }, { "category": "external", "summary": "1999784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784" }, { "category": "external", "summary": "2000274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000274" }, { "category": "external", "summary": "2003915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003915" }, { "category": "external", "summary": "2009204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009204" }, { "category": "external", "summary": "2010030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010030" }, { "category": "external", "summary": "2010175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010175" }, { "category": "external", "summary": "2010272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010272" }, { "category": "external", "summary": "2010991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010991" }, { "category": "external", "summary": "2011000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011000" }, { "category": "external", "summary": "2011001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011001" }, { "category": "external", "summary": "2011004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011004" }, { "category": "external", "summary": "2011010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011010" }, { "category": "external", "summary": "2011017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011017" }, { "category": "external", "summary": "2011020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011020" }, { "category": "external", "summary": "2013157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013157" }, { "category": "external", "summary": "1993366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993366" }, { "category": "external", "summary": "2014084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014084" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4618.json" } ], "title": "Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4 images and security updates", "tracking": { "current_release_date": "2025-08-05T15:08:54+00:00", "generator": { "date": "2025-08-05T15:08:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:4618", "initial_release_date": "2021-11-11T18:31:07+00:00", "revision_history": [ { "date": "2021-11-11T18:31:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-11T18:31:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-05T15:08:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.4::el8" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "product_id": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "product": { "name": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "product_id": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.0-164" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "product": { "name": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "product_id": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "product": { "name": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "product_id": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-image-service-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "product": { "name": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "product_id": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "product": { "name": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "product_id": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.0-53" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "product_id": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "product_id": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.0-47" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "product": { "name": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "product_id": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "product_id": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.0-17" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "product": { "name": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "product_id": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-operator-bundle\u0026tag=v2.4.0-168" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "product_id": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "product": { "name": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "product_id": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "product_id": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.0-19" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.0-48" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "product_id": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "product": { "name": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "product_id": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "product_id": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "product": { "name": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "product_id": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "product": { "name": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "product_id": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "product": { "name": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "product_id": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "product_id": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "product": { "name": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "product_id": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "product": { "name": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "product_id": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-agent-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "product": { "name": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "product_id": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "product": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "product_id": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-reporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "product_id": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "product": { "name": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "product_id": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "product": { "name": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "product_id": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.0-14" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "product": { "name": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "product_id": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "product": { "name": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "product_id": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.0-20" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "product_id": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.0-33" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "product": { "name": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "product_id": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "product": { "name": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "product_id": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "product": { "name": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "product_id": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.0-8" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "product_id": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "product": { "name": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "product_id": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.0-164" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "product": { "name": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "product_id": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "product": { "name": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "product_id": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-image-service-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "product": { "name": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "product_id": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "product": { "name": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "product_id": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.0-53" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "product_id": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "product_id": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.0-47" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "product": { "name": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "product_id": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "product_id": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.0-17" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "product_id": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "product": { "name": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "product_id": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "product_id": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.0-19" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.0-48" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "product_id": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "product_id": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "product_id": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "product": { "name": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "product_id": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "product": { "name": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "product_id": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "product": { "name": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "product_id": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "product_id": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "product": { "name": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "product_id": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "product": { "name": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "product_id": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "product": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "product_id": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-reporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "product_id": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "product": { "name": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "product_id": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "product": { "name": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "product_id": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.0-14" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "product": { "name": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "product_id": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "product": { "name": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "product_id": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.0-20" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "product_id": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.0-33" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "product": { "name": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "product_id": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "product": { "name": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "product_id": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "product": { "name": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "product_id": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.0-8" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "product_id": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "product": { "name": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "product_id": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.0-164" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "product": { "name": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "product_id": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "product": { "name": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "product_id": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "product": { "name": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "product_id": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.0-53" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "product_id": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "product_id": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.0-47" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "product": { "name": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "product_id": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "product_id": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.0-17" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "product_id": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "product": { "name": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "product_id": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "product_id": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.0-19" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.0-48" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "product_id": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "product": { "name": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "product_id": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "product_id": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "product": { "name": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "product_id": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "product": { "name": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "product_id": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "product": { "name": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "product_id": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "product_id": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "product": { "name": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "product_id": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "product_id": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "product": { "name": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "product_id": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "product": { "name": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "product_id": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.0-14" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "product": { "name": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "product_id": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "product": { "name": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "product_id": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.0-20" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "product_id": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.0-33" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "product": { "name": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "product_id": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "product": { "name": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "product_id": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x", "product": { "name": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x", "product_id": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.0-8" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64" }, "product_reference": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le" }, "product_reference": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64" }, "product_reference": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64" }, "product_reference": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le" }, "product_reference": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le" }, "product_reference": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64" }, "product_reference": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x" }, "product_reference": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64" }, "product_reference": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le" }, "product_reference": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le" }, "product_reference": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x" }, "product_reference": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64" }, "product_reference": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64" }, "product_reference": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x" }, "product_reference": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64" }, "product_reference": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le" }, "product_reference": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x" }, "product_reference": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64" }, "product_reference": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le" }, "product_reference": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le" }, "product_reference": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x" }, "product_reference": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64" }, "product_reference": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x" }, "product_reference": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le" }, "product_reference": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64" }, "product_reference": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64" }, "product_reference": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x" }, "product_reference": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le" }, "product_reference": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le" }, "product_reference": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x" }, "product_reference": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64" }, "product_reference": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x" }, "product_reference": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64" }, "product_reference": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le" }, "product_reference": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le" }, "product_reference": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64" }, "product_reference": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" }, "product_reference": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ], "organization": "John Ouyang", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-3711", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-08-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995623" } ], "notes": [ { "category": "description", "text": "A flaw was found in openssl. A miscalculation of a buffer size was found in openssl\u0027s SM2 decryption function, allowing up to 62 arbitrary bytes to be written outside of the buffer. A remote attacker could use this flaw to crash an application supporting SM2 signature or encryption algorithm, or, possibly, execute arbitrary code with the permissions of the user running that application. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SM2 Decryption Buffer Overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenSSL packages shipped with Red Hat Enterprise Linux 8 are not compiled with support for SM2 algorithm and therefore are not affected by this flaw. Packages shipped with Red Hat Enterprise Linux 7 and older do not support the SM2 algorithm. \n\nThe Red Hat Advanced Cluster Management for Kubernetes 2.3.1 and the previous versions are using the vulnerable version of the OpenSSL library, however the vulnerable code path is not reachable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "RHBZ#1995623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3711", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3711" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3711", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3711" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210824.txt", "url": "https://www.openssl.org/news/secadv/20210824.txt" } ], "release_date": "2021-08-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SM2 Decryption Buffer Overflow" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ], "organization": "Ingo Schwarze", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-08-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995634" } ], "notes": [ { "category": "description", "text": "It was found that openssl assumed ASN.1 strings to be NUL terminated. A malicious actor may be able to force an application into calling openssl function with a specially crafted, non-NUL terminated string to deliberately hit this bug, which may result in a crash of the application, causing a Denial of Service attack, or possibly, memory disclosure. The highest threat from this vulnerability is to data confidentiality and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Read buffer overruns processing ASN.1 strings", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do not ship the affected OpenSSL component but rely on the Red Hat Enterprise Linux to consume them:\n * Red Hat Satellite\n * Red Hat Update Infrastructure\n * Red Hat CloudForms\n\nThe Red Hat Advanced Cluster Management for Kubernetes is using the vulnerable version of the library, however the vulnerable code path is not reachable.\n\ncompat-openssl10 is deprecated and has been removed from RHEL 9 and later. No further patches would be available for this component except on a case by case basis.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3712" }, { "category": "external", "summary": "RHBZ#1995634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210824.txt", "url": "https://www.openssl.org/news/secadv/20210824.txt" } ], "release_date": "2021-08-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "Customers should make an attempt to run current binaries/architectures and not rely on compatibility layers to run older binaries/architectures. In case older binaries/architectures are needed, sandboxing should be used to address such problems and guard the bug.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Read buffer overruns processing ASN.1 strings" }, { "cve": "CVE-2021-3749", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999784" } ], "notes": [ { "category": "description", "text": "A Regular Expression Denial of Service (ReDoS) vulnerability was found in the nodejs axios. This flaw allows an attacker to provide crafted input to the trim function, which might cause high resources consumption and as a consequence lead to denial of service. The highest threat from this vulnerability is system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-axios: Regular expression denial of service in trim function", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift Container Platform (OCP) grafana-container does package a vulnerable version of nodejs axios. However, due to the instance being read only and behind OpenShift OAuth, the impact of this vulnerability is Low.\n\n* Red Hat Advanced Cluster Management for Kubernetes (RHACM) 2.1 and previous versions does contain a vulnerable version of nodejs axios, RHACM 2.2 on towards are not affected versions. For RHACM 2.1, due to the instance being read only and behind OAuth, the impact of this vulnerability is Low.\n\n* Because Service Telemetry Framework 1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF\u0027s service-telemetry-operator-container and smart-gateway-operator-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3749" }, { "category": "external", "summary": "RHBZ#1999784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3749", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749" }, { "category": "external", "summary": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929", "url": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929" }, { "category": "external", "summary": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31", "url": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31" } ], "release_date": "2021-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-axios: Regular expression denial of service in trim function" }, { "cve": "CVE-2021-23017", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2021-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1963121" } ], "notes": [ { "category": "description", "text": "A flaw was found in nginx. An off-by-one error while processing DNS responses allows a network attacker to write a dot character out of bounds in a heap allocated buffer which can allow overwriting the least significant byte of next heap chunk metadata likely leading to a remote code execution in certain circumstances. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23017" }, { "category": "external", "summary": "RHBZ#1963121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1963121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23017", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23017" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23017", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23017" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name" }, { "acknowledgments": [ { "names": [ "Meir Shpilraien" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32626", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011017" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow was found in redis. Specially crafted Lua scripts executing in Redis cause the heap-based Lua stack to overflow due to incomplete checks for this condition. This flaw allows a remote attacker to corrupt the heap and potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Lua scripts can overflow the heap-based Lua stack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32626" }, { "category": "external", "summary": "RHBZ#2011017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011017" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32626", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32626" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32626", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32626" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c", "url": "https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "Prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Lua scripts can overflow the heap-based Lua stack" }, { "acknowledgments": [ { "names": [ "sundb" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32627", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011010" } ], "notes": [ { "category": "description", "text": "An integer overflow issue was found in redis. The vulnerability involves changing the default \"proto-max-bulk-len\" and \"client-query-buffer-limit\" configuration parameters to very large values and constructing specially crafted large stream elements. This flaw allows a remote attacker to corrupt the heap and potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Integer overflow issue with Streams", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32627" }, { "category": "external", "summary": "RHBZ#2011010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32627", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32627" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32627", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32627" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v", "url": "https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "The flaw can be mitigated by disallowing usage of the CONFIG SET command via ACL configuration. This will prevent clients from setting the `proto-max-bulk-len` configuration parameter. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Integer overflow issue with Streams" }, { "acknowledgments": [ { "names": [ "sundb" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32628", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011004" } ], "notes": [ { "category": "description", "text": "An integer overflow issue was found in the redis ziplist data structure. The vulnerability involves modifying the default ziplist configuration parameters (hash-max-ziplist-entries, hash-max-ziplist-value, zset-max-ziplist-entries or zset-max-ziplist-value) to a very large value, and then constructing specially crafted commands to create very large ziplists. This flaw allows a remote attacker to corrupt the heap and potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Integer overflow bug in the ziplist data structure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32628" }, { "category": "external", "summary": "RHBZ#2011004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011004" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32628", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32628" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32628", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32628" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr", "url": "https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "The flaw can be mitigated by disallowing usage of the CONFIG SET command via ACL configuration. This will prevent clients from setting the above configuration parameters. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Integer overflow bug in the ziplist data structure" }, { "acknowledgments": [ { "names": [ "Meir Shpilraien" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32672", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011001" } ], "notes": [ { "category": "description", "text": "A flaw was found in redis. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger\u2019s protocol parser to read data beyond the actual buffer, potentially leading to an information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Out of bounds read in lua debugger protocol parser", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32672" }, { "category": "external", "summary": "RHBZ#2011001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32672", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32672" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm", "url": "https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "redis: Out of bounds read in lua debugger protocol parser" }, { "cve": "CVE-2021-32675", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011000" } ], "notes": [ { "category": "description", "text": "A flaw was found in redis. When parsing an incoming Redis Standard Protocol (RESP) request, redis allocates memory according to user-specified values, which determine the number of elements (in the multi-bulk header) and size of each element (in the bulk header). This flaw allows an unauthenticated, remote user delivering specially crafted requests over multiple connections to cause the server to allocate a significant amount of memory, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Denial of service via Redis Standard Protocol (RESP) request", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32675" }, { "category": "external", "summary": "RHBZ#2011000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011000" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32675", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32675" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p", "url": "https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "Prevent unauthenticated users from connecting to Redis by using network access control tools (e.g., firewalls) or enabling TLS and requiring users to authenticate using client side certificates.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Denial of service via Redis Standard Protocol (RESP) request" }, { "acknowledgments": [ { "names": [ "Pawel Wieczorkiewicz" ], "organization": "Amazon Web Services", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32687", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2010991" } ], "notes": [ { "category": "description", "text": "An integer overflow issue was found in redis. The vulnerability involves changing the default \"set-max-intset-entries\" configuration parameter to a very large value and constructing specially crafted commands to manipulate sets. This flaw allows a remote attacker to leak arbitrary contents of the heap or potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Integer overflow issue with intsets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32687" }, { "category": "external", "summary": "RHBZ#2010991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32687", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32687" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32687", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32687" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q", "url": "https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "The flaw can be mitigated by disallowing usage of the CONFIG SET command via ACL configuration. This will prevent clients from setting the `set-max-intset-entries` configuration parameter. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Integer overflow issue with intsets" }, { "cve": "CVE-2021-32690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1978144" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in Helm, which could allow credentials associated with one Helm repository to be leaked to another repository referenced by the first one. In order to exploit this vulnerability, an attacker would need to control a repository trusted by the configuration of the target Helm instance.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm: information disclosure vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Advanced Cluster Management for Kubernetes:\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are using helm chart provided by the installer, so components are not using untrusted charts except in the application-lifecycle area. For this reason we marked the impact as low. For RHACM, the credentials could be leaked only when a helm chart is stored in a domain other than the helm repository itself. In practice, this rarely happens as the chart is stored in the same helm repository. For example, this chart in the helm repo https://charts.helm.sh/stable/index.yaml references only charts stored in the same domain (charts.heml.sh). From version, 2.2 onwards, multicloud-operators-placementrule and multicloud-operators-deployable do not use helm at all.\n\nOpenShift Developer Tools and Services:\n\nThe OpenShift Helm team has analyzed this CVE and we have come to the conclusion that this only affects OpenShift Helm customers that use the CLI to install and update charts. It does not affect customers that use the OpenShift Console to install and update charts. To mitigate this issue, customers can refresh their Helm cli by following the Red Had official Helm install guide here: https://docs.openshift.com/container-platform/4.7/cli_reference/helm_cli/getting-started-with-helm-on-openshift-container-platform.html#installing-helm_getting-started-with-helm-on-openshift. The mirror (https://mirror.openshift.com/pub/openshift-v4/clients/helm/latest/) have already been updated with helm 3.6.2 which contains the fix for this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32690" }, { "category": "external", "summary": "RHBZ#1978144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978144" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32690" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf", "url": "https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf" } ], "release_date": "2021-06-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "helm: information disclosure vulnerability" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-33623", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966615" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-trim-newlines. Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-trim-newlines: ReDoS in .end() method", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) grafana-container does package a vulnerable verison of nodejs trim-newlines. However due to the instance being read only and behind OpenShift OAuth, the impact by this vulnerability is Low. Red Hat Advanced Cluster Management for Kubernetes (ACM) containers affected by this flaw are only accessible to authenticated users, thus the impact of this vulnerability is Low. \nRed Hat Virtualization (RHV) does package a vulnerable version of nodejs-trim-newlines. However, no untrusted content is being parsed therefore the impact of this vulnerability is Low.\n\nThe hosted services are shipped with the vulnerable packages, however the vulnerable methods were not identified in use at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33623" }, { "category": "external", "summary": "RHBZ#1966615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33623", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33623" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33623", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33623" } ], "release_date": "2021-05-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-trim-newlines: ReDoS in .end() method" }, { "acknowledgments": [ { "names": [ "yiyuaner" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-41099", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011020" } ], "notes": [ { "category": "description", "text": "An integer overflow issue was found in redis in the underlying string library. The vulnerability involves changing the default \"proto-max-bulk-len\" configuration parameter to a very large value and constructing specially crafted network payloads or commands. This flaw allows a remote attacker to corrupt the heap and potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Integer overflow issue with strings", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-41099" }, { "category": "external", "summary": "RHBZ#2011020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-41099", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41099" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41099", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41099" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph", "url": "https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "The flaw can be mitigated by disallowing usage of the CONFIG SET command via ACL configuration. This will prevent clients from setting the `proto-max-bulk-len` configuration parameter. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Integer overflow issue with strings" } ] }
rhsa-2021:3623
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)\n\n* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)\n\n* nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)\n\n* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)\n\n* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)\n\n* nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)\n\n* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* nodejs:12/nodejs: Make FIPS options always available (BZ#1993927)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3623", "url": "https://access.redhat.com/errata/RHSA-2021:3623" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "1993927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993927" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3623.json" } ], "title": "Red Hat Security Advisory: nodejs:12 security and bug fix update", "tracking": { "current_release_date": "2025-08-04T01:57:54+00:00", "generator": { "date": "2025-08-04T01:57:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:3623", "initial_release_date": "2021-09-21T13:22:11+00:00", "revision_history": [ { "date": "2021-09-21T13:22:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-21T13:22:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T01:57:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:12:8040020210817133458:522a0ee4", "product": { "name": "nodejs:12:8040020210817133458:522a0ee4", "product_id": "nodejs:12:8040020210817133458:522a0ee4", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12?rpmmod=nodejs:12:8040020210817133458:522a0ee4" } } }, { "category": "product_version", "name": "nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "product": { "name": "nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "product_id": "nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "product": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "product_id": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.4.0%2B11732%2Bc668cc9f?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_id": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "product": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "product_id": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "product": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "product_id": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.4.0%2B11732%2Bc668cc9f?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_id": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_id": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_id": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, "product_reference": "nodejs:12:8040020210817133458:522a0ee4", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch" }, "product_reference": "nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch" }, "product_reference": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src" }, "product_reference": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3672", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988342" } ], "notes": [ { "category": "description", "text": "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "c-ares: Missing input validation of host names may lead to domain hijacking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3672" }, { "category": "external", "summary": "RHBZ#1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3672", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672" }, { "category": "external", "summary": "https://c-ares.haxx.se/adv_20210810.html", "url": "https://c-ares.haxx.se/adv_20210810.html" } ], "release_date": "2021-08-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-21T13:22:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "c-ares: Missing input validation of host names may lead to domain hijacking" }, { "cve": "CVE-2021-22930", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988394" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit the memory corruption, which causes a change in the process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22930" }, { "category": "external", "summary": "RHBZ#1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22930", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22930" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930" } ], "release_date": "2021-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-21T13:22:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-22931", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993019" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. These vulnerabilities include remote code execution, Cross-site scripting (XSS), application crashes due to missing input validation of hostnames returned by Domain Name Servers in the Node.js DNS library, which can lead to the output of wrong hostnames (leading to Domain hijacking) and injection vulnerabilities in applications using the library.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Improper handling of untypical characters in domain names", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22931" }, { "category": "external", "summary": "RHBZ#1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22931", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22931" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-21T13:22:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Improper handling of untypical characters in domain names" }, { "cve": "CVE-2021-22939", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993039" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. If the Node.js HTTPS API is used incorrectly and \"undefined\" is passed for the \"rejectUnauthorized\" parameter, no error is returned, and the connections to servers with an expired certificate are accepted. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Incomplete validation of tls rejectUnauthorized parameter", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22939" }, { "category": "external", "summary": "RHBZ#1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22939", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-21T13:22:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Incomplete validation of tls rejectUnauthorized parameter" }, { "cve": "CVE-2021-22940", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993029" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit memory corruption to change process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is a follow-up to CVE-2021-22930, as the issue was not completely resolved in the fix for CVE-2021-22930. Node.js as shipped in Red Hat Enterprise Linux 8 streams and Red Hat Software Collections is not explicitly affected by the incomplete fix because the incomplete fix was not released, but the original issue does affect these components.\n\nRed Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22940" }, { "category": "external", "summary": "RHBZ#1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22940", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-21T13:22:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-23343", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956818" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-path-parse. All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Had Quay , whilst a vulnerable version of `path-parse` is included in the quay-rhel8 container it is a development dependency only, hence the impact by this vulnerability is low.\n\nIn OpenShift Container Platform (OCP), the hadoop component which is a part of the OCP metering stack, ships the vulnerable version of \u0027path-parse\u0027.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected component is marked as wontfix.\nThis may be fixed in the future.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of `path-parse`, however the vulnerable functionality is currently not used in any part of the product.\n\nIn Red Hat Virtualization cockpit-ovirt, ovirt-engine-ui-extensions and ovirt-web-ui use vulnerable version of `path-parse`, however for cockpit-ovirt it is a development time dependency only, and for ovirt-engine-ui-extensions and ovirt-web-ui the vulnerable functions are never used.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "RHBZ#1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23343", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067", "url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067" } ], "release_date": "2021-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-21T13:22:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-21T13:22:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-21T13:22:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" } ] }
rhsa-2021:3666
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)\n\n* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)\n\n* nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)\n\n* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)\n\n* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)\n\n* nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)\n\n* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* nodejs:14/nodejs: Make FIPS options always available (BZ#1993924)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3666", "url": "https://access.redhat.com/errata/RHSA-2021:3666" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "1993924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993924" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3666.json" } ], "title": "Red Hat Security Advisory: nodejs:14 security and bug fix update", "tracking": { "current_release_date": "2025-08-04T01:57:34+00:00", "generator": { "date": "2025-08-04T01:57:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:3666", "initial_release_date": "2021-09-27T07:40:58+00:00", "revision_history": [ { "date": "2021-09-27T07:40:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-27T07:40:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T01:57:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:14:8040020210817165654:522a0ee4", "product": { "name": "nodejs:14:8040020210817165654:522a0ee4", "product_id": "nodejs:14:8040020210817165654:522a0ee4", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14?rpmmod=nodejs:14:8040020210817165654:522a0ee4" } } }, { "category": "product_version", "name": "nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "product": { "name": "nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "product_id": "nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "product": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "product_id": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "product": { "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "product_id": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_id": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product": { "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_id": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product": { "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_id": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product": { "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_id": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product": { "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_id": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "product": { "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "product_id": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.14.17.5.1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "product": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "product_id": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "product": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "product_id": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "product": { "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "product_id": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_id": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product": { "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_id": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product": { "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_id": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product": { "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_id": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product": { "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_id": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "product": { "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "product_id": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.14.17.5.1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_id": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product": { "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_id": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product": { "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_id": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product": { "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_id": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product": { "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_id": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "product": { "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "product_id": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.14.17.5.1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_id": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product": { "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_id": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product": { "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_id": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product": { "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_id": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product": { "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_id": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64", "product": { "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64", "product_id": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.14.17.5.1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, "product_reference": "nodejs:14:8040020210817165654:522a0ee4", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64" }, "product_reference": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le" }, "product_reference": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x" }, "product_reference": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src" }, "product_reference": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64" }, "product_reference": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64" }, "product_reference": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le" }, "product_reference": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x" }, "product_reference": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64" }, "product_reference": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64" }, "product_reference": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le" }, "product_reference": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x" }, "product_reference": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64" }, "product_reference": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64" }, "product_reference": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le" }, "product_reference": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x" }, "product_reference": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64" }, "product_reference": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch" }, "product_reference": "nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64" }, "product_reference": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le" }, "product_reference": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x" }, "product_reference": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64" }, "product_reference": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch" }, "product_reference": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src" }, "product_reference": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch" }, "product_reference": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src" }, "product_reference": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64" }, "product_reference": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le" }, "product_reference": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x" }, "product_reference": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" }, "product_reference": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3672", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988342" } ], "notes": [ { "category": "description", "text": "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "c-ares: Missing input validation of host names may lead to domain hijacking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3672" }, { "category": "external", "summary": "RHBZ#1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3672", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672" }, { "category": "external", "summary": "https://c-ares.haxx.se/adv_20210810.html", "url": "https://c-ares.haxx.se/adv_20210810.html" } ], "release_date": "2021-08-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-27T07:40:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3666" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "c-ares: Missing input validation of host names may lead to domain hijacking" }, { "cve": "CVE-2021-22930", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988394" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit the memory corruption, which causes a change in the process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22930" }, { "category": "external", "summary": "RHBZ#1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22930", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22930" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930" } ], "release_date": "2021-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-27T07:40:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3666" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-22931", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993019" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. These vulnerabilities include remote code execution, Cross-site scripting (XSS), application crashes due to missing input validation of hostnames returned by Domain Name Servers in the Node.js DNS library, which can lead to the output of wrong hostnames (leading to Domain hijacking) and injection vulnerabilities in applications using the library.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Improper handling of untypical characters in domain names", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22931" }, { "category": "external", "summary": "RHBZ#1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22931", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22931" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-27T07:40:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3666" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Improper handling of untypical characters in domain names" }, { "cve": "CVE-2021-22939", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993039" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. If the Node.js HTTPS API is used incorrectly and \"undefined\" is passed for the \"rejectUnauthorized\" parameter, no error is returned, and the connections to servers with an expired certificate are accepted. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Incomplete validation of tls rejectUnauthorized parameter", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22939" }, { "category": "external", "summary": "RHBZ#1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22939", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-27T07:40:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3666" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Incomplete validation of tls rejectUnauthorized parameter" }, { "cve": "CVE-2021-22940", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993029" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit memory corruption to change process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is a follow-up to CVE-2021-22930, as the issue was not completely resolved in the fix for CVE-2021-22930. Node.js as shipped in Red Hat Enterprise Linux 8 streams and Red Hat Software Collections is not explicitly affected by the incomplete fix because the incomplete fix was not released, but the original issue does affect these components.\n\nRed Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22940" }, { "category": "external", "summary": "RHBZ#1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22940", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-27T07:40:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3666" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-23343", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956818" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-path-parse. All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Had Quay , whilst a vulnerable version of `path-parse` is included in the quay-rhel8 container it is a development dependency only, hence the impact by this vulnerability is low.\n\nIn OpenShift Container Platform (OCP), the hadoop component which is a part of the OCP metering stack, ships the vulnerable version of \u0027path-parse\u0027.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected component is marked as wontfix.\nThis may be fixed in the future.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of `path-parse`, however the vulnerable functionality is currently not used in any part of the product.\n\nIn Red Hat Virtualization cockpit-ovirt, ovirt-engine-ui-extensions and ovirt-web-ui use vulnerable version of `path-parse`, however for cockpit-ovirt it is a development time dependency only, and for ovirt-engine-ui-extensions and ovirt-web-ui the vulnerable functions are never used.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "RHBZ#1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23343", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067", "url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067" } ], "release_date": "2021-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-27T07:40:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3666" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-27T07:40:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3666" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-27T07:40:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3666" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" } ] }
rhsa-2021:3281
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs12-nodejs and rh-nodejs12-nodejs-nodemon is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.22.5).\n\nSecurity Fix(es):\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)\n\n* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)\n\n* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)\n\n* nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)\n\n* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)\n\n* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)\n\n* nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)\n\n* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3281", "url": "https://access.redhat.com/errata/RHSA-2021:3281" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "1945459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945459" }, { "category": "external", "summary": "1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3281.json" } ], "title": "Red Hat Security Advisory: rh-nodejs12-nodejs and rh-nodejs12-nodejs-nodemon security update", "tracking": { "current_release_date": "2025-08-04T01:57:47+00:00", "generator": { "date": "2025-08-04T01:57:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:3281", "initial_release_date": "2021-08-26T10:18:55+00:00", "revision_history": [ { "date": "2021-08-26T10:18:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-26T10:18:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T01:57:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "product": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "product_id": "rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.5-1.el7?arch=src" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "product": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "product_id": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-5.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "product": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "product_id": "rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.5-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "product_id": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.22.5-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "product": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "product_id": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.14-12.22.5.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.22.5-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "product": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "product_id": "rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.5-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "product_id": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.22.5-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "product": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "product_id": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.14-12.22.5.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.22.5-1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "product": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "product_id": "rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.5-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "product_id": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.22.5-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "product": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "product_id": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.14-12.22.5.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.22.5-1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "product": { "name": "rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "product_id": "rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-docs@12.22.5-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "product": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "product_id": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-5.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.7" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7788", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-12-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1907444" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ini: Prototype pollution via malicious INI file", "title": "Vulnerability summary" }, { "category": "other", "text": "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7788" }, { "category": "external", "summary": "RHBZ#1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7788", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788" } ], "release_date": "2020-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ini: Prototype pollution via malicious INI file" }, { "cve": "CVE-2020-28469", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945459" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-glob-parent. The enclosure regex used to check for glob enclosures containing backslashes is vulnerable to Regular Expression Denial of Service attacks. This flaw allows an attacker to cause a denial of service if they can supply a malicious string to the glob-parent function. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-glob-parent: Regular expression denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "While some components do package a vulnerable version of glob-parent, access to them requires OpenShift OAuth credentials and hence have been marked with a Low impact. This applies to the following products:\n - OpenShift Container Platform (OCP)\n - OpenShift ServiceMesh (OSSM)\n - Red Hat Advanced Cluster Management for Kubernetes (RHACM)\n - OpenShift distributed tracing", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28469" }, { "category": "external", "summary": "RHBZ#1945459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945459" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28469", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28469" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28469" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", "url": "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905" } ], "release_date": "2021-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-glob-parent: Regular expression denial of service" }, { "cve": "CVE-2021-3672", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988342" } ], "notes": [ { "category": "description", "text": "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "c-ares: Missing input validation of host names may lead to domain hijacking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3672" }, { "category": "external", "summary": "RHBZ#1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3672", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672" }, { "category": "external", "summary": "https://c-ares.haxx.se/adv_20210810.html", "url": "https://c-ares.haxx.se/adv_20210810.html" } ], "release_date": "2021-08-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "c-ares: Missing input validation of host names may lead to domain hijacking" }, { "cve": "CVE-2021-22930", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988394" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit the memory corruption, which causes a change in the process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22930" }, { "category": "external", "summary": "RHBZ#1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22930", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22930" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930" } ], "release_date": "2021-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-22931", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993019" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. These vulnerabilities include remote code execution, Cross-site scripting (XSS), application crashes due to missing input validation of hostnames returned by Domain Name Servers in the Node.js DNS library, which can lead to the output of wrong hostnames (leading to Domain hijacking) and injection vulnerabilities in applications using the library.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Improper handling of untypical characters in domain names", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22931" }, { "category": "external", "summary": "RHBZ#1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22931", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22931" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Improper handling of untypical characters in domain names" }, { "cve": "CVE-2021-22939", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993039" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. If the Node.js HTTPS API is used incorrectly and \"undefined\" is passed for the \"rejectUnauthorized\" parameter, no error is returned, and the connections to servers with an expired certificate are accepted. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Incomplete validation of tls rejectUnauthorized parameter", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22939" }, { "category": "external", "summary": "RHBZ#1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22939", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Incomplete validation of tls rejectUnauthorized parameter" }, { "cve": "CVE-2021-22940", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993029" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit memory corruption to change process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is a follow-up to CVE-2021-22930, as the issue was not completely resolved in the fix for CVE-2021-22930. Node.js as shipped in Red Hat Enterprise Linux 8 streams and Red Hat Software Collections is not explicitly affected by the incomplete fix because the incomplete fix was not released, but the original issue does affect these components.\n\nRed Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22940" }, { "category": "external", "summary": "RHBZ#1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22940", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-23343", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956818" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-path-parse. All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Had Quay , whilst a vulnerable version of `path-parse` is included in the quay-rhel8 container it is a development dependency only, hence the impact by this vulnerability is low.\n\nIn OpenShift Container Platform (OCP), the hadoop component which is a part of the OCP metering stack, ships the vulnerable version of \u0027path-parse\u0027.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected component is marked as wontfix.\nThis may be fixed in the future.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of `path-parse`, however the vulnerable functionality is currently not used in any part of the product.\n\nIn Red Hat Virtualization cockpit-ovirt, ovirt-engine-ui-extensions and ovirt-web-ui use vulnerable version of `path-parse`, however for cockpit-ovirt it is a development time dependency only, and for ovirt-engine-ui-extensions and ovirt-web-ui the vulnerable functions are never used.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "RHBZ#1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23343", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067", "url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067" } ], "release_date": "2021-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" } ] }
rhsa-2021:3639
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (12.22.5). (BZ#1994941)\n\nSecurity Fix(es):\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)\n\n* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)\n\n* nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)\n\n* nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362)\n\n* nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode (CVE-2021-27290)\n\n* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)\n\n* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)\n\n* libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918)\n\n* nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)\n\n* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* nodejs:12/nodejs: Make FIPS options always available (BZ#1993929)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3639", "url": "https://access.redhat.com/errata/RHSA-2021:3639" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1941471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941471" }, { "category": "external", "summary": "1943208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943208" }, { "category": "external", "summary": "1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "1979338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979338" }, { "category": "external", "summary": "1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "1993929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993929" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3639.json" } ], "title": "Red Hat Security Advisory: nodejs:12 security and bug fix update", "tracking": { "current_release_date": "2025-08-04T01:57:02+00:00", "generator": { "date": "2025-08-04T01:57:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:3639", "initial_release_date": "2021-09-22T08:55:39+00:00", "revision_history": [ { "date": "2021-09-22T08:55:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-22T08:55:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T01:57:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:12:8010020210817113128:c27ad7f8", "product": { "name": "nodejs:12:8010020210817113128:c27ad7f8", "product_id": "nodejs:12:8010020210817113128:c27ad7f8", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12?rpmmod=nodejs:12:8010020210817113128:c27ad7f8" } } }, { "category": "product_version", "name": "nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "product": { "name": "nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "product_id": "nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_id": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "product": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "product_id": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_id": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_id": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_id": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, "product_reference": "nodejs:12:8010020210817113128:c27ad7f8", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch" }, "product_reference": "nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3672", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988342" } ], "notes": [ { "category": "description", "text": "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "c-ares: Missing input validation of host names may lead to domain hijacking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3672" }, { "category": "external", "summary": "RHBZ#1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3672", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672" }, { "category": "external", "summary": "https://c-ares.haxx.se/adv_20210810.html", "url": "https://c-ares.haxx.se/adv_20210810.html" } ], "release_date": "2021-08-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "c-ares: Missing input validation of host names may lead to domain hijacking" }, { "cve": "CVE-2021-22918", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-07-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1979338" } ], "notes": [ { "category": "description", "text": "A flaw has been found in libuv. Node.js is vulnerable to out-of-bounds read in libuv\u0027s uv__idna_toascii() function which is used to convert strings to ASCII which is called by Node\u0027s DNS module\u0027s lookup() function and can lead to information disclosures or crashes. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes", "title": "Vulnerability summary" }, { "category": "other", "text": "As distributed by Red Hat, a maximum of 3 bytes out of bound can be read. This would not be sufficient to crash nodejs or other applications using libuv, unless it was recompiled using an address sanitizer. The memory disclosure is also very limited.\n\nRed Hat Quay version 3.5 does not ship nodejs. Red Hat Quay version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use nodejs as a HTTP server.\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22918" }, { "category": "external", "summary": "RHBZ#1979338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22918", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22918" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/" } ], "release_date": "2021-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes" }, { "cve": "CVE-2021-22930", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988394" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit the memory corruption, which causes a change in the process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22930" }, { "category": "external", "summary": "RHBZ#1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22930", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22930" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930" } ], "release_date": "2021-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-22931", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993019" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. These vulnerabilities include remote code execution, Cross-site scripting (XSS), application crashes due to missing input validation of hostnames returned by Domain Name Servers in the Node.js DNS library, which can lead to the output of wrong hostnames (leading to Domain hijacking) and injection vulnerabilities in applications using the library.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Improper handling of untypical characters in domain names", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22931" }, { "category": "external", "summary": "RHBZ#1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22931", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22931" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Improper handling of untypical characters in domain names" }, { "cve": "CVE-2021-22939", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993039" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. If the Node.js HTTPS API is used incorrectly and \"undefined\" is passed for the \"rejectUnauthorized\" parameter, no error is returned, and the connections to servers with an expired certificate are accepted. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Incomplete validation of tls rejectUnauthorized parameter", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22939" }, { "category": "external", "summary": "RHBZ#1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22939", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Incomplete validation of tls rejectUnauthorized parameter" }, { "cve": "CVE-2021-22940", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993029" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit memory corruption to change process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is a follow-up to CVE-2021-22930, as the issue was not completely resolved in the fix for CVE-2021-22930. Node.js as shipped in Red Hat Enterprise Linux 8 streams and Red Hat Software Collections is not explicitly affected by the incomplete fix because the incomplete fix was not released, but the original issue does affect these components.\n\nRed Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22940" }, { "category": "external", "summary": "RHBZ#1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22940", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-23343", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956818" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-path-parse. All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Had Quay , whilst a vulnerable version of `path-parse` is included in the quay-rhel8 container it is a development dependency only, hence the impact by this vulnerability is low.\n\nIn OpenShift Container Platform (OCP), the hadoop component which is a part of the OCP metering stack, ships the vulnerable version of \u0027path-parse\u0027.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected component is marked as wontfix.\nThis may be fixed in the future.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of `path-parse`, however the vulnerable functionality is currently not used in any part of the product.\n\nIn Red Hat Virtualization cockpit-ovirt, ovirt-engine-ui-extensions and ovirt-web-ui use vulnerable version of `path-parse`, however for cockpit-ovirt it is a development time dependency only, and for ovirt-engine-ui-extensions and ovirt-web-ui the vulnerable functions are never used.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "RHBZ#1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23343", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067", "url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067" } ], "release_date": "2021-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe" }, { "cve": "CVE-2021-23362", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1943208" } ], "notes": [ { "category": "description", "text": "A regular expression denial of service vulnerability was found in hosted-git-info. If an application allows user input into the affected regular expression (regexp) function, `shortcutMatch` or `fromUrl`, then an attacker could craft a regexp which takes an ever increasing amount of time to process, potentially resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl()", "title": "Vulnerability summary" }, { "category": "other", "text": "While some components do package a vulnerable version of hosted-git-info, access to them requires OpenShift OAuth credentials and hence have been marked with a Low impact. This applies to the following products:\n - OpenShift Container Platform (OCP)\n - OpenShift ServiceMesh (OSSM)\n - Red Hat Advanced Cluster Management for Kubernetes (RHACM)\n\nSpecifically the following components:\n - The OCP hive-container does ship the vulnerable component, however since OCP 4.6 the Metering product has been deprecated [1], set as wont-fix and may be fixed in a future release.\n\nRed Hat Ceph Storage (RHCS) 4 packages a version of nodejs-hosted-git-info which is vulnerable to this flaw in the grafana-container shipped with it. \n\nRed Hat Quay includes hosted-git-info as a dependency of karma-coverage which is only used at development time. The hosted-git-info library is not used at runtime so the impact is low for Red Hat Quay.\n\nRed Hat Virtualization includes a vulnerable version of hosted-git-info, however it is only used during development. The hosted-git-info library is not used at runtime thus impact is rated Low and marked as \"wontfix\" at this time. Future updates may address this flaw.\n\n[1] - https://access.redhat.com/solutions/5707561", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23362" }, { "category": "external", "summary": "RHBZ#1943208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23362", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23362" } ], "release_date": "2021-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl()" }, { "cve": "CVE-2021-27290", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2021-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1941471" } ], "notes": [ { "category": "description", "text": "A flaw was found in ssri package. A malicious string provided by an attacker may lead to Regular Expression Denial of Service (ReDoS). This issue only affects consumers\r\nusing the strict option. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode", "title": "Vulnerability summary" }, { "category": "other", "text": "Whilst the OpenShift ServiceMesh (OSSM) servicemesh-grafana and servicemesh-prometheus include the vulnerable ssri library, the vulnerable \"strict\" option is not used. Similar to OSSM, OpenShift Container Platform (OCP), Red Hat Advance Cluster Management for Kubernetes (RHACM) and OpenShift distributed tracing components include the vulnerable ssri library but the \"strict\" option is not used. Additionally access to the vulnerable library is protected by OpenShift OAuth what reducing impact by this flaw to LOW. Therefore these OSSM, OCP, RHACM and OpenShift distributed tracing components have been marked as wont-fix and may be addressed in a future updates.\n\nRed Hat Virtualization includes ssri in cockpit-ovirt, ovirt-web-ui and ovirt-engine-ui-extensions, but the vulnerable \"strict\" option is not used. Additionally access to the vulnerable library is protected by RHV authentication. Therefore the impact of this flaw for RHV has been reduced to LOW and components have been marked as wont-fix and may be addressed in a future update.\n\nRed Hat Quay includes ssri as a dependency of webpack which is only used at build time. The library is not used at runtime, reducing the impact of this vulnerability to low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27290" }, { "category": "external", "summary": "RHBZ#1941471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941471" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27290", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27290" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27290", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27290" } ], "release_date": "2021-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" } ] }
rhsa-2021:3638
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (12.22.5). (BZ#1994939)\n\nSecurity Fix(es):\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)\n\n* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)\n\n* nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)\n\n* nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362)\n\n* nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode (CVE-2021-27290)\n\n* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)\n\n* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)\n\n* libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918)\n\n* nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)\n\n* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* nodejs:12/nodejs: Make FIPS options always available (BZ#1993928)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3638", "url": "https://access.redhat.com/errata/RHSA-2021:3638" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1941471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941471" }, { "category": "external", "summary": "1943208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943208" }, { "category": "external", "summary": "1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "1979338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979338" }, { "category": "external", "summary": "1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "1993928", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993928" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3638.json" } ], "title": "Red Hat Security Advisory: nodejs:12 security and bug fix update", "tracking": { "current_release_date": "2025-08-04T01:56:51+00:00", "generator": { "date": "2025-08-04T01:56:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:3638", "initial_release_date": "2021-09-22T09:06:26+00:00", "revision_history": [ { "date": "2021-09-22T09:06:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-22T09:06:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T01:56:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:12:8020020210817125332:4cda2c84", "product": { "name": "nodejs:12:8020020210817125332:4cda2c84", "product_id": "nodejs:12:8020020210817125332:4cda2c84", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12?rpmmod=nodejs:12:8020020210817125332:4cda2c84" } } }, { "category": "product_version", "name": "nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "product": { "name": "nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "product_id": "nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_id": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "product": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "product_id": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_id": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_id": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_id": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, "product_reference": "nodejs:12:8020020210817125332:4cda2c84", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch" }, "product_reference": "nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3672", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988342" } ], "notes": [ { "category": "description", "text": "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "c-ares: Missing input validation of host names may lead to domain hijacking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3672" }, { "category": "external", "summary": "RHBZ#1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3672", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672" }, { "category": "external", "summary": "https://c-ares.haxx.se/adv_20210810.html", "url": "https://c-ares.haxx.se/adv_20210810.html" } ], "release_date": "2021-08-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "c-ares: Missing input validation of host names may lead to domain hijacking" }, { "cve": "CVE-2021-22918", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-07-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1979338" } ], "notes": [ { "category": "description", "text": "A flaw has been found in libuv. Node.js is vulnerable to out-of-bounds read in libuv\u0027s uv__idna_toascii() function which is used to convert strings to ASCII which is called by Node\u0027s DNS module\u0027s lookup() function and can lead to information disclosures or crashes. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes", "title": "Vulnerability summary" }, { "category": "other", "text": "As distributed by Red Hat, a maximum of 3 bytes out of bound can be read. This would not be sufficient to crash nodejs or other applications using libuv, unless it was recompiled using an address sanitizer. The memory disclosure is also very limited.\n\nRed Hat Quay version 3.5 does not ship nodejs. Red Hat Quay version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use nodejs as a HTTP server.\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22918" }, { "category": "external", "summary": "RHBZ#1979338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22918", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22918" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/" } ], "release_date": "2021-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes" }, { "cve": "CVE-2021-22930", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988394" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit the memory corruption, which causes a change in the process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22930" }, { "category": "external", "summary": "RHBZ#1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22930", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22930" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930" } ], "release_date": "2021-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-22931", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993019" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. These vulnerabilities include remote code execution, Cross-site scripting (XSS), application crashes due to missing input validation of hostnames returned by Domain Name Servers in the Node.js DNS library, which can lead to the output of wrong hostnames (leading to Domain hijacking) and injection vulnerabilities in applications using the library.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Improper handling of untypical characters in domain names", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22931" }, { "category": "external", "summary": "RHBZ#1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22931", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22931" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Improper handling of untypical characters in domain names" }, { "cve": "CVE-2021-22939", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993039" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. If the Node.js HTTPS API is used incorrectly and \"undefined\" is passed for the \"rejectUnauthorized\" parameter, no error is returned, and the connections to servers with an expired certificate are accepted. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Incomplete validation of tls rejectUnauthorized parameter", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22939" }, { "category": "external", "summary": "RHBZ#1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22939", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Incomplete validation of tls rejectUnauthorized parameter" }, { "cve": "CVE-2021-22940", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993029" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit memory corruption to change process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is a follow-up to CVE-2021-22930, as the issue was not completely resolved in the fix for CVE-2021-22930. Node.js as shipped in Red Hat Enterprise Linux 8 streams and Red Hat Software Collections is not explicitly affected by the incomplete fix because the incomplete fix was not released, but the original issue does affect these components.\n\nRed Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22940" }, { "category": "external", "summary": "RHBZ#1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22940", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-23343", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956818" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-path-parse. All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Had Quay , whilst a vulnerable version of `path-parse` is included in the quay-rhel8 container it is a development dependency only, hence the impact by this vulnerability is low.\n\nIn OpenShift Container Platform (OCP), the hadoop component which is a part of the OCP metering stack, ships the vulnerable version of \u0027path-parse\u0027.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected component is marked as wontfix.\nThis may be fixed in the future.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of `path-parse`, however the vulnerable functionality is currently not used in any part of the product.\n\nIn Red Hat Virtualization cockpit-ovirt, ovirt-engine-ui-extensions and ovirt-web-ui use vulnerable version of `path-parse`, however for cockpit-ovirt it is a development time dependency only, and for ovirt-engine-ui-extensions and ovirt-web-ui the vulnerable functions are never used.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "RHBZ#1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23343", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067", "url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067" } ], "release_date": "2021-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe" }, { "cve": "CVE-2021-23362", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1943208" } ], "notes": [ { "category": "description", "text": "A regular expression denial of service vulnerability was found in hosted-git-info. If an application allows user input into the affected regular expression (regexp) function, `shortcutMatch` or `fromUrl`, then an attacker could craft a regexp which takes an ever increasing amount of time to process, potentially resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl()", "title": "Vulnerability summary" }, { "category": "other", "text": "While some components do package a vulnerable version of hosted-git-info, access to them requires OpenShift OAuth credentials and hence have been marked with a Low impact. This applies to the following products:\n - OpenShift Container Platform (OCP)\n - OpenShift ServiceMesh (OSSM)\n - Red Hat Advanced Cluster Management for Kubernetes (RHACM)\n\nSpecifically the following components:\n - The OCP hive-container does ship the vulnerable component, however since OCP 4.6 the Metering product has been deprecated [1], set as wont-fix and may be fixed in a future release.\n\nRed Hat Ceph Storage (RHCS) 4 packages a version of nodejs-hosted-git-info which is vulnerable to this flaw in the grafana-container shipped with it. \n\nRed Hat Quay includes hosted-git-info as a dependency of karma-coverage which is only used at development time. The hosted-git-info library is not used at runtime so the impact is low for Red Hat Quay.\n\nRed Hat Virtualization includes a vulnerable version of hosted-git-info, however it is only used during development. The hosted-git-info library is not used at runtime thus impact is rated Low and marked as \"wontfix\" at this time. Future updates may address this flaw.\n\n[1] - https://access.redhat.com/solutions/5707561", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23362" }, { "category": "external", "summary": "RHBZ#1943208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23362", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23362" } ], "release_date": "2021-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl()" }, { "cve": "CVE-2021-27290", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2021-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1941471" } ], "notes": [ { "category": "description", "text": "A flaw was found in ssri package. A malicious string provided by an attacker may lead to Regular Expression Denial of Service (ReDoS). This issue only affects consumers\r\nusing the strict option. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode", "title": "Vulnerability summary" }, { "category": "other", "text": "Whilst the OpenShift ServiceMesh (OSSM) servicemesh-grafana and servicemesh-prometheus include the vulnerable ssri library, the vulnerable \"strict\" option is not used. Similar to OSSM, OpenShift Container Platform (OCP), Red Hat Advance Cluster Management for Kubernetes (RHACM) and OpenShift distributed tracing components include the vulnerable ssri library but the \"strict\" option is not used. Additionally access to the vulnerable library is protected by OpenShift OAuth what reducing impact by this flaw to LOW. Therefore these OSSM, OCP, RHACM and OpenShift distributed tracing components have been marked as wont-fix and may be addressed in a future updates.\n\nRed Hat Virtualization includes ssri in cockpit-ovirt, ovirt-web-ui and ovirt-engine-ui-extensions, but the vulnerable \"strict\" option is not used. Additionally access to the vulnerable library is protected by RHV authentication. Therefore the impact of this flaw for RHV has been reduced to LOW and components have been marked as wont-fix and may be addressed in a future update.\n\nRed Hat Quay includes ssri as a dependency of webpack which is only used at build time. The library is not used at runtime, reducing the impact of this vulnerability to low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27290" }, { "category": "external", "summary": "RHBZ#1941471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941471" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27290", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27290" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27290", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27290" } ], "release_date": "2021-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" } ] }
rhsa-2021:5086
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.9.0 on Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Data Foundation is software-defined storage integrated\nwith and optimized for the Red Hat OpenShift Container Platform. Red Hat\nOpenShift Data Foundation is a highly scalable, production-grade persistent\nstorage for stateful applications running in the Red Hat OpenShift\nContainer Platform. In addition to persistent storage, Red Hat OpenShift\nData Foundation provisions a multicloud data management service with an S3\ncompatible API.\n\nSecurity Fix(es):\n\n* kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9 (CVE-2020-8565)\n\n* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)\n\n* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\n* nodejs-tar: insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)\n\n* nodejs-tar: insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information refer to the CVE\npage(s) listed in the References section.\n\nThese updated images include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.9/html/4.9_release_notes/index\n\nAll Red Hat OpenShift Data Foundation users are advised to upgrade to\nthese updated images, which provide numerous bug fixes and enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:5086", "url": "https://access.redhat.com/errata/RHSA-2021:5086" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1810525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810525" }, { "category": "external", "summary": "1853638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853638" }, { "category": "external", "summary": "1886638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886638" }, { "category": "external", "summary": "1890438", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890438" }, { "category": "external", "summary": "1890978", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890978" }, { "category": "external", "summary": "1892709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892709" }, { "category": "external", "summary": "1901954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901954" }, { "category": "external", "summary": "1910790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910790" }, { "category": "external", "summary": "1927782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927782" }, { "category": "external", "summary": "1929242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1929242" }, { "category": "external", "summary": "1932396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932396" }, { "category": "external", "summary": "1934625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934625" }, { "category": "external", "summary": "1956285", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956285" }, { "category": "external", "summary": "1959793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959793" }, { "category": "external", "summary": "1964083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964083" }, { "category": "external", "summary": "1965322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965322" }, { "category": "external", "summary": "1968510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1968510" }, { "category": "external", "summary": "1968606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1968606" }, { "category": "external", "summary": "1969216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969216" }, { "category": "external", "summary": "1973256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1973256" }, { "category": "external", "summary": "1975272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975272" }, { "category": "external", "summary": "1975581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975581" }, { "category": "external", "summary": "1979244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979244" }, { "category": "external", "summary": "1979502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979502" }, { "category": "external", "summary": "1980818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980818" }, { "category": "external", "summary": "1981331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981331" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1983756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983756" }, { "category": "external", "summary": "1984284", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984284" }, { "category": "external", "summary": "1984334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984334" }, { "category": "external", "summary": "1984396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984396" }, { "category": "external", "summary": "1984735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984735" }, { "category": "external", "summary": "1985074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985074" }, { "category": "external", "summary": "1986444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986444" }, { "category": "external", "summary": "1986794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986794" }, { "category": "external", "summary": "1987806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1987806" }, { "category": "external", "summary": "1999748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999748" }, { "category": "external", "summary": "1988518", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988518" }, { "category": "external", "summary": "1989482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989482" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1990230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990230" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1991822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991822" }, { "category": "external", "summary": "1992472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992472" }, { "category": "external", "summary": "1994261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994261" }, { "category": "external", "summary": "1994577", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994577" }, { "category": "external", "summary": "1994584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994584" }, { "category": "external", "summary": "1994602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994602" }, { "category": "external", "summary": "1999763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999763" }, { "category": "external", "summary": "1994606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994606" }, { "category": "external", "summary": "1994687", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994687" }, { "category": "external", "summary": "1995009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995009" }, { "category": "external", "summary": "1995056", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995056" }, { "category": "external", "summary": "1995271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995271" }, { "category": "external", "summary": "1995718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995718" }, { "category": "external", "summary": "1997237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997237" }, { "category": "external", "summary": "1997624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997624" }, { "category": "external", "summary": "1997738", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997738" }, { "category": "external", "summary": "1997922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997922" }, { "category": "external", "summary": "1998851", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998851" }, { "category": "external", "summary": "1999050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999050" }, { "category": "external", "summary": "1999731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999731" }, { "category": "external", "summary": "1999739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999739" }, { "category": "external", "summary": "1999767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999767" }, { "category": "external", "summary": "2000082", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000082" }, { "category": "external", "summary": "2000098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000098" }, { "category": "external", "summary": "2000143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000143" }, { "category": "external", "summary": "2000190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000190" }, { "category": "external", "summary": "2000579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000579" }, { "category": "external", "summary": "2000588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000588" }, { "category": "external", "summary": "2000860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000860" }, { "category": "external", "summary": "2000865", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000865" }, { "category": "external", "summary": "2001482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001482" }, { "category": "external", "summary": "2001539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001539" }, { "category": "external", "summary": "2001580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001580" }, { "category": "external", "summary": "2001970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001970" }, { "category": "external", "summary": "2002225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002225" }, { "category": "external", "summary": "2003444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003444" }, { "category": "external", "summary": "2003904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003904" }, { "category": "external", "summary": "2004003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004003" }, { "category": "external", "summary": "2004013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004013" }, { "category": "external", "summary": "2004030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004030" }, { "category": "external", "summary": "2004824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004824" }, { "category": "external", "summary": "2005103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005103" }, { "category": "external", "summary": "2005290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005290" }, { "category": "external", "summary": "2005812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005812" }, { "category": "external", "summary": "2005838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005838" }, { "category": "external", "summary": "2005843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005843" }, { "category": "external", "summary": "2005937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005937" }, { "category": "external", "summary": "2006176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006176" }, { "category": "external", "summary": "2006865", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006865" }, { "category": "external", "summary": "2007130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007130" }, { "category": "external", "summary": "2007202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007202" }, { "category": "external", "summary": "2007212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007212" }, { "category": "external", "summary": "2007377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007377" }, { "category": "external", "summary": "2007717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007717" }, { "category": "external", "summary": "2010041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010041" }, { "category": "external", "summary": "2010185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010185" }, { "category": "external", "summary": "2010188", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010188" }, { "category": "external", "summary": "2010194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010194" }, { "category": "external", "summary": "2010202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010202" }, { "category": "external", "summary": "2011225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011225" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_5086.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update", "tracking": { "current_release_date": "2025-08-04T01:59:48+00:00", "generator": { "date": "2025-08-04T01:59:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:5086", "initial_release_date": "2021-12-13T19:26:22+00:00", "revision_history": [ { "date": "2021-12-13T19:26:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-12-13T19:26:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T01:59:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product": { "name": "Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_data_foundation:4.9::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Data Foundation" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "product": { "name": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "product_id": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745?arch=s390x\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=4.9-164.57484e3.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "product_id": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "product": { "name": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "product_id": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "product": { "name": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "product_id": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "product": { "name": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "product_id": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=4.9-39.0f2fa23.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product": { "name": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product_id": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb?arch=s390x\u0026repository_url=registry.redhat.io/odf/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "product": { "name": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "product_id": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "product": { "name": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "product_id": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=4.9-59.c8bbc1f.release_4.9" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "product_id": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "product_id": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "product": { "name": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "product_id": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=4.9-27.3d037cc.release_4.9" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3?arch=s390x\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=4.9-219.c3f67c6.release_4.9" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "product_id": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe?arch=s390x\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=4.9-28.82f68db.release_4.9" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "product": { "name": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "product_id": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=4.9-164.57484e3.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "product_id": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "product": { "name": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "product_id": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "product": { "name": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "product_id": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "product": { "name": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "product_id": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=4.9-39.0f2fa23.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product": { "name": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product_id": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039?arch=ppc64le\u0026repository_url=registry.redhat.io/odf/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "product": { "name": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "product_id": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "product": { "name": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "product_id": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=4.9-59.c8bbc1f.release_4.9" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "product_id": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "product_id": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "product": { "name": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "product_id": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=4.9-27.3d037cc.release_4.9" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=4.9-219.c3f67c6.release_4.9" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le", "product_id": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=4.9-28.82f68db.release_4.9" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "product": { "name": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "product_id": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95?arch=amd64\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=4.9-164.57484e3.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "product_id": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "product": { "name": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "product_id": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "product": { "name": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "product_id": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "product": { "name": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "product_id": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=4.9-39.0f2fa23.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product": { "name": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product_id": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d?arch=amd64\u0026repository_url=registry.redhat.io/odf/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "product": { "name": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "product_id": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "product": { "name": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "product_id": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=4.9-59.c8bbc1f.release_4.9" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "product_id": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "product_id": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "product": { "name": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "product_id": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=4.9-27.3d037cc.release_4.9" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4?arch=amd64\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=4.9-219.c3f67c6.release_4.9" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "product_id": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336?arch=amd64\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=4.9-28.82f68db.release_4.9" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le" }, "product_reference": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64" }, "product_reference": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x" }, "product_reference": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x" }, "product_reference": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64" }, "product_reference": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le" }, "product_reference": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64" }, "product_reference": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le" }, "product_reference": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x" }, "product_reference": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le" }, "product_reference": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64" }, "product_reference": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x" }, "product_reference": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64" }, "product_reference": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le" }, "product_reference": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x" }, "product_reference": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x" }, "product_reference": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64" }, "product_reference": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le" }, "product_reference": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le" }, "product_reference": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x" }, "product_reference": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64" }, "product_reference": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] }, { "names": [ "Patrick Rhomberg" ], "organization": "purelyapplied", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-8565", "cwe": { "id": "CWE-117", "name": "Improper Output Neutralization for Logs" }, "discovery_date": "2020-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886638" } ], "notes": [ { "category": "description", "text": "A flaw was found in kubernetes. In Kubernetes, if the logging level is to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like `kubectl`. Previously, CVE-2019-11250 was assigned for the same issue for logging levels of at least 4.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform 4 does not support LogLevels higher than 8 (via \u0027TraceAll\u0027), and is therefore not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8565" }, { "category": "external", "summary": "RHBZ#1886638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886638" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8565", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8565" }, { "category": "external", "summary": "https://github.com/kubernetes/kubernetes/issues/95623", "url": "https://github.com/kubernetes/kubernetes/issues/95623" }, { "category": "external", "summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk", "url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" }, { "cve": "CVE-2021-37701", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999731" } ], "notes": [ { "category": "description", "text": "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37701" }, { "category": "external", "summary": "RHBZ#1999731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999731" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37701", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37701" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37701" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc" }, { "category": "external", "summary": "https://www.npmjs.com/advisories/1779", "url": "https://www.npmjs.com/advisories/1779" } ], "release_date": "2021-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-37712", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999739" } ], "notes": [ { "category": "description", "text": "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37712" }, { "category": "external", "summary": "RHBZ#1999739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999739" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37712" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37712" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p" }, { "category": "external", "summary": "https://www.npmjs.com/advisories/1780", "url": "https://www.npmjs.com/advisories/1780" } ], "release_date": "2021-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite" } ] }
wid-sec-w-2023-0856
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0856 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0856.json" }, { "category": "self", "summary": "WID-SEC-2023-0856 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0856" }, { "category": "external", "summary": "IBM Security Bulletin 6980799 vom 2023-04-04", "url": "https://www.ibm.com/support/pages/node/6980799" }, { "category": "external", "summary": "IBM Security Bulletin vom 2022-05-31", "url": "https://www.ibm.com/support/pages/node/6590981" } ], "source_lang": "en-US", "title": "IBM QRadar SIEM: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-04-04T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:48:07.215+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0856", "initial_release_date": "2022-05-31T22:00:00.000+00:00", "revision_history": [ { "date": "2022-05-31T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-04T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM QRadar SIEM \u003c 3.0.1", "product": { "name": "IBM QRadar SIEM \u003c 3.0.1", "product_id": "T023376", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:3.0.1" } } } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-11655", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-11655" }, { "cve": "CVE-2020-11656", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-11656" }, { "cve": "CVE-2020-13434", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-13434" }, { "cve": "CVE-2020-13435", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-13435" }, { "cve": "CVE-2020-13630", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-13630" }, { "cve": "CVE-2020-13631", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-13631" }, { "cve": "CVE-2020-13632", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-13632" }, { "cve": "CVE-2020-15168", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-15168" }, { "cve": "CVE-2020-15358", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-15358" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-7788", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-7788" }, { "cve": "CVE-2020-9327", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-9327" }, { "cve": "CVE-2021-22918", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-22918" }, { "cve": "CVE-2021-22930", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-22930" }, { "cve": "CVE-2021-22931", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-22931" }, { "cve": "CVE-2021-22939", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-22939" }, { "cve": "CVE-2021-22940", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-22940" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-23362", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-23362" }, { "cve": "CVE-2021-27290", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-27290" }, { "cve": "CVE-2021-32803", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-32804" }, { "cve": "CVE-2021-33502", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-33502" }, { "cve": "CVE-2021-3672", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-3672" }, { "cve": "CVE-2021-37701", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-37701" }, { "cve": "CVE-2021-37712", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-37712" }, { "cve": "CVE-2021-37713", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-37713" }, { "cve": "CVE-2021-3807", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-3807" }, { "cve": "CVE-2021-3918", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-3918" } ] }
wid-sec-w-2024-1591
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1591 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1591.json" }, { "category": "self", "summary": "WID-SEC-2024-1591 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1591" }, { "category": "external", "summary": "Juniper Patchday July 2024 vom 2024-07-10", "url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending\u0026numberOfResults=100\u0026f:ctype=%5BSecurity%20Advisories%5D" } ], "source_lang": "en-US", "title": "Juniper JUNOS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-11T23:00:00.000+00:00", "generator": { "date": "2024-11-12T09:31:28.569+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-1591", "initial_release_date": "2024-07-10T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-10T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "2", "summary": "URL Kodierung angepasst" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Juniper JUNOS", "product": { "name": "Juniper JUNOS", "product_id": "T036093", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:-" } } } ], "category": "vendor", "name": "Juniper" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-20001", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2006-20001" }, { "cve": "CVE-2007-5846", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2007-5846" }, { "cve": "CVE-2008-6123", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2008-6123" }, { "cve": "CVE-2011-1473", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2011-1473" }, { "cve": "CVE-2011-5094", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2011-5094" }, { "cve": "CVE-2012-6151", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2012-6151" }, { "cve": "CVE-2014-10064", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-10064" }, { "cve": "CVE-2014-2285", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-2285" }, { "cve": "CVE-2014-2310", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-2310" }, { "cve": "CVE-2014-3565", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-3565" }, { "cve": "CVE-2014-7191", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-7191" }, { "cve": "CVE-2014-8882", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-8882" }, { "cve": "CVE-2015-5621", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2015-5621" }, { "cve": "CVE-2015-8100", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2015-8100" }, { "cve": "CVE-2015-9262", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2015-9262" }, { "cve": "CVE-2016-1000232", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2016-1000232" }, { "cve": "CVE-2016-10540", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2016-10540" }, { "cve": "CVE-2016-4658", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2016-4658" }, { "cve": "CVE-2017-1000048", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2017-1000048" }, { "cve": "CVE-2017-15010", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2017-15010" }, { "cve": "CVE-2018-18065", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-18065" }, { "cve": "CVE-2018-20834", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-20834" }, { "cve": "CVE-2018-3737", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-3737" }, { "cve": "CVE-2018-7408", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-7408" }, { "cve": "CVE-2019-10081", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10081" }, { "cve": "CVE-2019-10082", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10082" }, { "cve": "CVE-2019-10092", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10092" }, { "cve": "CVE-2019-10097", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10097" }, { "cve": "CVE-2019-10098", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10098" }, { "cve": "CVE-2019-11719", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-11719" }, { "cve": "CVE-2019-11727", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-11727" }, { "cve": "CVE-2019-11756", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-11756" }, { "cve": "CVE-2019-16775", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-16775" }, { "cve": "CVE-2019-16776", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-16776" }, { "cve": "CVE-2019-16777", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-16777" }, { "cve": "CVE-2019-17006", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-17006" }, { "cve": "CVE-2019-17023", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-17023" }, { "cve": "CVE-2019-17567", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-17567" }, { "cve": "CVE-2019-20149", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-20149" }, { "cve": "CVE-2019-20892", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-20892" }, { "cve": "CVE-2019-9517", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-9517" }, { "cve": "CVE-2020-11668", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-11668" }, { "cve": "CVE-2020-11984", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-11984" }, { "cve": "CVE-2020-11993", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-11993" }, { "cve": "CVE-2020-12362", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12362" }, { "cve": "CVE-2020-12400", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12400" }, { "cve": "CVE-2020-12401", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12401" }, { "cve": "CVE-2020-12402", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12402" }, { "cve": "CVE-2020-12403", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12403" }, { "cve": "CVE-2020-13938", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-13938" }, { "cve": "CVE-2020-13950", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-13950" }, { "cve": "CVE-2020-14145", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-14145" }, { "cve": "CVE-2020-15861", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-15861" }, { "cve": "CVE-2020-15862", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-15862" }, { "cve": "CVE-2020-1927", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-1927" }, { "cve": "CVE-2020-1934", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-1934" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28502", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-28502" }, { "cve": "CVE-2020-35452", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-35452" }, { "cve": "CVE-2020-36049", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-36049" }, { "cve": "CVE-2020-6829", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-6829" }, { "cve": "CVE-2020-7660", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-7660" }, { "cve": "CVE-2020-7754", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-7754" }, { "cve": "CVE-2020-7774", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-7774" }, { "cve": "CVE-2020-8648", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-8648" }, { "cve": "CVE-2020-9490", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-9490" }, { "cve": "CVE-2021-22543", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-22543" }, { "cve": "CVE-2021-2342", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2342" }, { "cve": "CVE-2021-23440", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-23440" }, { "cve": "CVE-2021-2356", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2356" }, { "cve": "CVE-2021-2372", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2372" }, { "cve": "CVE-2021-2385", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2385" }, { "cve": "CVE-2021-2389", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2389" }, { "cve": "CVE-2021-2390", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2390" }, { "cve": "CVE-2021-25745", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-25745" }, { "cve": "CVE-2021-25746", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-25746" }, { "cve": "CVE-2021-25748", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-25748" }, { "cve": "CVE-2021-26690", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-26690" }, { "cve": "CVE-2021-26691", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-26691" }, { "cve": "CVE-2021-27290", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-27290" }, { "cve": "CVE-2021-29469", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-29469" }, { "cve": "CVE-2021-30641", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-30641" }, { "cve": "CVE-2021-31535", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-31535" }, { "cve": "CVE-2021-31618", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-31618" }, { "cve": "CVE-2021-3177", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-3177" }, { "cve": "CVE-2021-32803", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-32804" }, { "cve": "CVE-2021-33033", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33033" }, { "cve": "CVE-2021-33034", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33034" }, { "cve": "CVE-2021-33193", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33193" }, { "cve": "CVE-2021-3347", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-3347" }, { "cve": "CVE-2021-33909", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33909" }, { "cve": "CVE-2021-34798", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-34798" }, { "cve": "CVE-2021-35604", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-35604" }, { "cve": "CVE-2021-35624", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-35624" }, { "cve": "CVE-2021-36160", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-36160" }, { "cve": "CVE-2021-37701", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-37701" }, { "cve": "CVE-2021-37712", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-37712" }, { "cve": "CVE-2021-37713", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-37713" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-39275", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-39275" }, { "cve": "CVE-2021-40438", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-40438" }, { "cve": "CVE-2021-41524", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-41524" }, { "cve": "CVE-2021-41773", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-41773" }, { "cve": "CVE-2021-42013", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-42013" }, { "cve": "CVE-2021-43527", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-43527" }, { "cve": "CVE-2021-44224", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44224" }, { "cve": "CVE-2021-44225", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44225" }, { "cve": "CVE-2021-44790", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44790" }, { "cve": "CVE-2021-44906", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44906" }, { "cve": "CVE-2022-21245", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21245" }, { "cve": "CVE-2022-21270", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21270" }, { "cve": "CVE-2022-21303", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21303" }, { "cve": "CVE-2022-21304", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21304" }, { "cve": "CVE-2022-21344", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21344" }, { "cve": "CVE-2022-21367", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21367" }, { "cve": "CVE-2022-21417", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21417" }, { "cve": "CVE-2022-21427", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21427" }, { "cve": "CVE-2022-21444", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21444" }, { "cve": "CVE-2022-21451", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21451" }, { "cve": "CVE-2022-21454", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21454" }, { "cve": "CVE-2022-21460", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21460" }, { "cve": "CVE-2022-21589", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21589" }, { "cve": "CVE-2022-21592", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21592" }, { "cve": "CVE-2022-21595", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21595" }, { "cve": "CVE-2022-21608", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21608" }, { "cve": "CVE-2022-21617", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21617" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22822", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22824" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23524", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23524" }, { "cve": "CVE-2022-23525", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23525" }, { "cve": "CVE-2022-23526", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23526" }, { "cve": "CVE-2022-23852", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23943", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23943" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-2526", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-2526" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-26377", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-26377" }, { "cve": "CVE-2022-28330", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-28330" }, { "cve": "CVE-2022-28614", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-28614" }, { "cve": "CVE-2022-28615", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-28615" }, { "cve": "CVE-2022-29167", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-29167" }, { "cve": "CVE-2022-29404", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-29404" }, { "cve": "CVE-2022-30522", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-30522" }, { "cve": "CVE-2022-30556", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-30556" }, { "cve": "CVE-2022-31813", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-31813" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-41741", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-41741" }, { "cve": "CVE-2022-41742", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-41742" }, { "cve": "CVE-2022-4203", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4203" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-46663", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-46663" }, { "cve": "CVE-2022-4886", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4886" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0216", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0216" }, { "cve": "CVE-2023-0217", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0217" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0401", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0401" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0767", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0767" }, { "cve": "CVE-2023-1255", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-1255" }, { "cve": "CVE-2023-2002", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2002" }, { "cve": "CVE-2023-20593", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-20593" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21840", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21840" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21912", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21912" }, { "cve": "CVE-2023-21963", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21963" }, { "cve": "CVE-2023-21980", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21980" }, { "cve": "CVE-2023-22025", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22025" }, { "cve": "CVE-2023-22067", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22067" }, { "cve": "CVE-2023-22081", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22081" }, { "cve": "CVE-2023-22652", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22652" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-25153", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-25153" }, { "cve": "CVE-2023-25173", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-25173" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-2700", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2700" }, { "cve": "CVE-2023-27522", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-27522" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-2975", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2975" }, { "cve": "CVE-2023-30079", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-30079" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-3090", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3090" }, { "cve": "CVE-2023-32067", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32067" }, { "cve": "CVE-2023-32360", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32360" }, { "cve": "CVE-2023-32435", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32435" }, { "cve": "CVE-2023-32439", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32439" }, { "cve": "CVE-2023-32732", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32732" }, { "cve": "CVE-2023-3341", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3341" }, { "cve": "CVE-2023-3390", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3390" }, { "cve": "CVE-2023-33953", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-33953" }, { "cve": "CVE-2023-34058", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-34058" }, { "cve": "CVE-2023-34059", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-34059" }, { "cve": "CVE-2023-3446", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3446" }, { "cve": "CVE-2023-34969", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-34969" }, { "cve": "CVE-2023-35001", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-35001" }, { "cve": "CVE-2023-35788", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-35788" }, { "cve": "CVE-2023-3611", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3611" }, { "cve": "CVE-2023-37450", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-37450" }, { "cve": "CVE-2023-3776", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3776" }, { "cve": "CVE-2023-3817", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3817" }, { "cve": "CVE-2023-4004", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4004" }, { "cve": "CVE-2023-4206", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4206" }, { "cve": "CVE-2023-4207", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4207" }, { "cve": "CVE-2023-4208", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4208" }, { "cve": "CVE-2023-42753", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-42753" }, { "cve": "CVE-2023-4785", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4785" }, { "cve": "CVE-2023-4807", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4807" }, { "cve": "CVE-2023-4863", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4863" }, { "cve": "CVE-2023-5043", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-5043" }, { "cve": "CVE-2023-5129", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-5129" }, { "cve": "CVE-2023-5363", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-5363" }, { "cve": "CVE-2024-20918", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20918" }, { "cve": "CVE-2024-20919", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20919" }, { "cve": "CVE-2024-20921", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20921" }, { "cve": "CVE-2024-20926", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20926" }, { "cve": "CVE-2024-20932", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20932" }, { "cve": "CVE-2024-20945", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20945" }, { "cve": "CVE-2024-20952", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20952" }, { "cve": "CVE-2024-39511", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39511" }, { "cve": "CVE-2024-39512", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39512" }, { "cve": "CVE-2024-39513", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39513" }, { "cve": "CVE-2024-39514", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39514" }, { "cve": "CVE-2024-39517", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39517" }, { "cve": "CVE-2024-39518", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39518" }, { "cve": "CVE-2024-39519", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39519" }, { "cve": "CVE-2024-39520", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39520" }, { "cve": "CVE-2024-39521", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39521" }, { "cve": "CVE-2024-39522", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39522" }, { "cve": "CVE-2024-39523", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39523" }, { "cve": "CVE-2024-39524", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39524" }, { "cve": "CVE-2024-39528", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39528" }, { "cve": "CVE-2024-39529", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39529" }, { "cve": "CVE-2024-39530", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39530" }, { "cve": "CVE-2024-39531", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39531" }, { "cve": "CVE-2024-39532", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39532" }, { "cve": "CVE-2024-39533", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39533" }, { "cve": "CVE-2024-39535", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39535" }, { "cve": "CVE-2024-39536", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39536" }, { "cve": "CVE-2024-39537", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39537" }, { "cve": "CVE-2024-39538", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39538" }, { "cve": "CVE-2024-39539", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39539" }, { "cve": "CVE-2024-39540", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39540" }, { "cve": "CVE-2024-39541", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39541" }, { "cve": "CVE-2024-39542", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39542" }, { "cve": "CVE-2024-39543", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39543" }, { "cve": "CVE-2024-39545", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39545" }, { "cve": "CVE-2024-39546", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39546" }, { "cve": "CVE-2024-39548", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39548" }, { "cve": "CVE-2024-39549", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39549" }, { "cve": "CVE-2024-39550", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39550" }, { "cve": "CVE-2024-39551", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39551" }, { "cve": "CVE-2024-39553", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39553" }, { "cve": "CVE-2024-39554", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39554" }, { "cve": "CVE-2024-39555", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39555" }, { "cve": "CVE-2024-39556", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39556" }, { "cve": "CVE-2024-39557", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39557" }, { "cve": "CVE-2024-39558", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39558" }, { "cve": "CVE-2024-39559", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39559" }, { "cve": "CVE-2024-39560", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39560" }, { "cve": "CVE-2024-39561", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39561" }, { "cve": "CVE-2024-39565", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39565" } ] }
wid-sec-w-2023-0857
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0857 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0857.json" }, { "category": "self", "summary": "WID-SEC-2023-0857 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0857" }, { "category": "external", "summary": "IBM Security Bulletin 6980799 vom 2023-04-04", "url": "https://www.ibm.com/support/pages/node/6980799" }, { "category": "external", "summary": "IBM Security Bulletin: 6589583 vom 2022-05-24", "url": "https://www.ibm.com/support/pages/node/6589583" }, { "category": "external", "summary": "IBM Security Bulletin: 6589583 vom 2022-05-24", "url": "https://www.ibm.com/support/pages/node/6589581" } ], "source_lang": "en-US", "title": "IBM QRadar SIEM: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-04-04T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:48:07.460+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0857", "initial_release_date": "2022-05-24T22:00:00.000+00:00", "revision_history": [ { "date": "2022-05-24T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-04T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM QRadar SIEM", "product": { "name": "IBM QRadar SIEM", "product_id": "T021415", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:-" } } } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15168", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2020-15168" }, { "cve": "CVE-2020-24025", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2020-24025" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28498", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2020-28498" }, { "cve": "CVE-2020-28500", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2020-28500" }, { "cve": "CVE-2020-7793", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2020-7793" }, { "cve": "CVE-2021-23337", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-23337" }, { "cve": "CVE-2021-27292", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-27292" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-32803", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-32804" }, { "cve": "CVE-2021-33502", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-33502" }, { "cve": "CVE-2021-33623", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-33623" }, { "cve": "CVE-2021-37701", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-37701" }, { "cve": "CVE-2021-37712", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-37712" }, { "cve": "CVE-2021-37713", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-37713" }, { "cve": "CVE-2021-3807", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-3807" } ] }
wid-sec-w-2023-0809
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0809 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0809.json" }, { "category": "self", "summary": "WID-SEC-2023-0809 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0809" }, { "category": "external", "summary": "IBM Security Bulletin: 6967283 vom 2023-03-30", "url": "https://www.ibm.com/support/pages/node/6967283" }, { "category": "external", "summary": "IBM Security Bulletin: 6967333 vom 2023-03-30", "url": "https://www.ibm.com/support/pages/node/6967333" }, { "category": "external", "summary": "IBM Security Bulletin 6980799 vom 2023-04-04", "url": "https://www.ibm.com/support/pages/node/6980799" }, { "category": "external", "summary": "IBM Security Bulletin 7108657 vom 2024-01-17", "url": "https://www.ibm.com/support/pages/node/7108657" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-5ECC250449 vom 2024-02-19", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-5ecc250449" } ], "source_lang": "en-US", "title": "IBM QRadar SIEM: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-02-19T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:47:38.606+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0809", "initial_release_date": "2023-03-30T22:00:00.000+00:00", "revision_history": [ { "date": "2023-03-30T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-04T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-01-16T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-02-19T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Fedora aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7.5", "product": { "name": "IBM QRadar SIEM 7.5", "product_id": "T022954", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5" } } }, { "category": "product_version_range", "name": "\u003c User Behavior Analytics 4.1.11", "product": { "name": "IBM QRadar SIEM \u003c User Behavior Analytics 4.1.11", "product_id": "T027026" } }, { "category": "product_version_range", "name": "\u003c 7.4.3 FP9", "product": { "name": "IBM QRadar SIEM \u003c 7.4.3 FP9", "product_id": "T027027" } }, { "category": "product_version_range", "name": "\u003c 7.5.0 UP5", "product": { "name": "IBM QRadar SIEM \u003c 7.5.0 UP5", "product_id": "T027028" } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2023-22809" }, { "cve": "CVE-2022-4883", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-4883" }, { "cve": "CVE-2022-46364", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-46364" }, { "cve": "CVE-2022-46363", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-46363" }, { "cve": "CVE-2022-45143", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-45143" }, { "cve": "CVE-2022-42890", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-42890" }, { "cve": "CVE-2022-4254", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-4254" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41946", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-41946" }, { "cve": "CVE-2022-41704", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-41704" }, { "cve": "CVE-2022-40156", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-40156" }, { "cve": "CVE-2022-40155", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-40155" }, { "cve": "CVE-2022-40154", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-40154" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37598", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-37598" }, { "cve": "CVE-2022-3676", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-3676" }, { "cve": "CVE-2022-36364", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-36364" }, { "cve": "CVE-2022-36033", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-36033" }, { "cve": "CVE-2022-34917", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-34917" }, { "cve": "CVE-2022-31197", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-31197" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-28733", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-28733" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-25927", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-25927" }, { "cve": "CVE-2022-25901", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-25901" }, { "cve": "CVE-2022-25758", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-25758" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-24839", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-24839" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24785", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-24785" }, { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-23437" }, { "cve": "CVE-2022-22971", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-22971" }, { "cve": "CVE-2022-22970", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-22970" }, { "cve": "CVE-2022-21724", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-21724" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-21619" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-42740", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-42740" }, { "cve": "CVE-2021-42581", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-42581" }, { "cve": "CVE-2021-39227", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-39227" }, { "cve": "CVE-2021-3918", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-3918" }, { "cve": "CVE-2021-3807", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-3807" }, { "cve": "CVE-2021-37713", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-37713" }, { "cve": "CVE-2021-37712", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-37712" }, { "cve": "CVE-2021-37701", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-37701" }, { "cve": "CVE-2021-3765", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-3765" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-32804", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-32804" }, { "cve": "CVE-2021-32803", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-32803" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-26401", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-26401" }, { "cve": "CVE-2021-25220", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-25220" }, { "cve": "CVE-2021-23450", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-23450" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-23368", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-23368" }, { "cve": "CVE-2021-23364", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-23364" }, { "cve": "CVE-2021-23362", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-23362" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-21290" }, { "cve": "CVE-2020-7764", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2020-7764" }, { "cve": "CVE-2020-5259", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2020-5259" }, { "cve": "CVE-2020-24025", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2020-24025" }, { "cve": "CVE-2020-15366", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2020-15366" }, { "cve": "CVE-2020-13936", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2020-13936" }, { "cve": "CVE-2019-6286", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2019-6286" }, { "cve": "CVE-2019-6284", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2019-6284" }, { "cve": "CVE-2019-6283", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2019-6283" }, { "cve": "CVE-2019-10785", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2019-10785" }, { "cve": "CVE-2018-8036", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-8036" }, { "cve": "CVE-2018-20821", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-20821" }, { "cve": "CVE-2018-20190", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-20190" }, { "cve": "CVE-2018-19839", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-19839" }, { "cve": "CVE-2018-19838", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-19838" }, { "cve": "CVE-2018-19827", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-19827" }, { "cve": "CVE-2018-19797", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-19797" }, { "cve": "CVE-2018-15494", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-15494" }, { "cve": "CVE-2018-11698", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-11698" }, { "cve": "CVE-2018-11694", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-11694" } ] }
wid-sec-w-2022-0092
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um Dateien zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0092 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0092.json" }, { "category": "self", "summary": "WID-SEC-2022-0092 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0092" }, { "category": "external", "summary": "NodeJs Security Release vom 2021-08-31", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases2/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3638 vom 2021-09-22", "url": "https://access.redhat.com/errata/RHSA-2021:3638" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3639 vom 2021-09-22", "url": "https://access.redhat.com/errata/RHSA-2021:3639" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3623 vom 2021-09-21", "url": "https://access.redhat.com/errata/RHSA-2021:3623" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-3623 vom 2021-09-22", "url": "http://linux.oracle.com/errata/ELSA-2021-3623.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3666 vom 2021-09-28", "url": "https://access.redhat.com/errata/RHSA-2021:3666" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-3666 vom 2021-09-28", "url": "http://linux.oracle.com/errata/ELSA-2021-3666.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4618 vom 2021-11-11", "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "external", "summary": "Debian Security Advisory DSA-5008 vom 2021-11-12", "url": "https://www.debian.org/security/2021/dsa-5008" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3886-1 vom 2021-12-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009816.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3940-1 vom 2021-12-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009853.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3964-1 vom 2021-12-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009869.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:5086 vom 2021-12-13", "url": "https://access.redhat.com/errata/RHSA-2021:5086" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0041 vom 2022-01-06", "url": "https://access.redhat.com/errata/RHSA-2022:0041" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0101-1 vom 2022-01-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010017.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0246 vom 2022-01-25", "url": "https://access.redhat.com/errata/RHSA-2022:0246" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4914 vom 2022-06-06", "url": "https://access.redhat.com/errata/RHSA-2022:4914" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0350 vom 2022-02-02", "url": "https://access.redhat.com/errata/RHSA-2022:0350" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-0350 vom 2022-02-02", "url": "http://linux.oracle.com/errata/ELSA-2022-0350.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1717-1 vom 2022-05-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011058.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0531-1 vom 2022-02-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010279.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0563-1 vom 2022-02-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010304.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0569-1 vom 2022-02-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010307.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0570-1 vom 2022-02-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010306.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0657-1 vom 2022-03-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010326.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0704-1 vom 2022-03-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010344.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0715-1 vom 2022-03-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010355.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3237 vom 2022-12-12", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202405-29 vom 2024-05-08", "url": "https://security.gentoo.org/glsa/202405-29" } ], "source_lang": "en-US", "title": "Node.js: Mehrere Schwachstellen erm\u00f6glichen Manipulation von Dateien", "tracking": { "current_release_date": "2024-05-09T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:26:27.934+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-0092", "initial_release_date": "2021-08-31T22:00:00.000+00:00", "revision_history": [ { "date": "2021-08-31T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2021-09-21T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-09-22T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-09-27T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2021-11-11T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-11-14T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2021-12-02T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-12-06T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-12-07T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-12-13T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-06T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-18T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-01-24T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-01T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-02T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-02-21T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-02-24T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-03-02T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-03-03T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-03-06T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-05-17T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-06-06T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-12-12T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-05-09T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Gentoo aufgenommen" } ], "status": "final", "version": "24" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cv12.22.6 (LTS)", "product": { "name": "Open Source Node.js \u003cv12.22.6 (LTS)", "product_id": "T020280" } }, { "category": "product_version_range", "name": "\u003cv14.17.6 (LTS)", "product": { "name": "Open Source Node.js \u003cv14.17.6 (LTS)", "product_id": "T020281" } } ], "category": "product_name", "name": "Node.js" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-32803", "notes": [ { "category": "description", "text": "In Node.js existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Modulen \"tar\" und \"@npmcli/arborist\" und aufgrund von Symlink-Fehlern. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Dateien zu manipulieren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T012167", "T004914" ] }, "release_date": "2021-08-31T22:00:00.000+00:00", "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "notes": [ { "category": "description", "text": "In Node.js existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Modulen \"tar\" und \"@npmcli/arborist\" und aufgrund von Symlink-Fehlern. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Dateien zu manipulieren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T012167", "T004914" ] }, "release_date": "2021-08-31T22:00:00.000+00:00", "title": "CVE-2021-32804" }, { "cve": "CVE-2021-37701", "notes": [ { "category": "description", "text": "In Node.js existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Modulen \"tar\" und \"@npmcli/arborist\" und aufgrund von Symlink-Fehlern. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Dateien zu manipulieren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T012167", "T004914" ] }, "release_date": "2021-08-31T22:00:00.000+00:00", "title": "CVE-2021-37701" }, { "cve": "CVE-2021-37712", "notes": [ { "category": "description", "text": "In Node.js existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Modulen \"tar\" und \"@npmcli/arborist\" und aufgrund von Symlink-Fehlern. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Dateien zu manipulieren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T012167", "T004914" ] }, "release_date": "2021-08-31T22:00:00.000+00:00", "title": "CVE-2021-37712" }, { "cve": "CVE-2021-37713", "notes": [ { "category": "description", "text": "In Node.js existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Modulen \"tar\" und \"@npmcli/arborist\" und aufgrund von Symlink-Fehlern. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Dateien zu manipulieren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T012167", "T004914" ] }, "release_date": "2021-08-31T22:00:00.000+00:00", "title": "CVE-2021-37713" }, { "cve": "CVE-2021-39134", "notes": [ { "category": "description", "text": "In Node.js existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Modulen \"tar\" und \"@npmcli/arborist\" und aufgrund von Symlink-Fehlern. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Dateien zu manipulieren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T012167", "T004914" ] }, "release_date": "2021-08-31T22:00:00.000+00:00", "title": "CVE-2021-39134" }, { "cve": "CVE-2021-39135", "notes": [ { "category": "description", "text": "In Node.js existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Modulen \"tar\" und \"@npmcli/arborist\" und aufgrund von Symlink-Fehlern. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Dateien zu manipulieren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T012167", "T004914" ] }, "release_date": "2021-08-31T22:00:00.000+00:00", "title": "CVE-2021-39135" } ] }
fkie_cve-2021-32804
Vulnerability from fkie_nvd
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
▶ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9 | Mitigation, Third Party Advisory | |
security-advisories@github.com | https://www.npmjs.com/advisories/1770 | Mitigation, Third Party Advisory | |
security-advisories@github.com | https://www.npmjs.com/package/tar | Product, Third Party Advisory | |
security-advisories@github.com | https://www.oracle.com/security-alerts/cpuoct2021.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9 | Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.npmjs.com/advisories/1770 | Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.npmjs.com/package/tar | Product, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuoct2021.html | Patch, Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
tar_project | tar | * | |
tar_project | tar | * | |
tar_project | tar | * | |
tar_project | tar | * | |
oracle | graalvm | 20.3.3 | |
oracle | graalvm | 21.2.0 | |
siemens | sinec_infrastructure_network_services | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "48083832-29DB-4428-836C-BC1072AC6384", "versionEndExcluding": "3.2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "77DE1692-7EF1-43FF-95CB-B1EAA8CB030B", "versionEndExcluding": "4.4.14", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "EF8B9011-1EAA-4D9E-89CA-597D7309EE66", "versionEndExcluding": "5.0.6", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "24EC2FC6-7549-4C94-9560-54A88703BCA5", "versionEndExcluding": "6.1.1", "versionStartIncluding": "6.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:graalvm:20.3.3:*:*:*:enterprise:*:*:*", "matchCriteriaId": "53B2BB06-A2F7-4603-89C3-C8500E55483A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:graalvm:21.2.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "01E88C86-8C04-4A4A-BF45-9082AA783056", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F46497-4AB0-49A7-9453-CC26837BF253", "versionEndExcluding": "1.0.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar." }, { "lang": "es", "value": "El paquete npm \"tar\" (tambi\u00e9n se conoce como node-tar) versiones anteriores a 6.1.1, 5.0.6, 4.4.14 y 3.3.2, presenta una vulnerabilidad de Creaci\u00f3n y Sobrescritura de archivos arbitraria debido a un saneo insuficiente de rutas absolutas. node-tar pretende impedir la extracci\u00f3n de rutas absolutas de archivos al convertir las rutas absolutas en relativas cuando el flag \"preservePaths\" no est\u00e1 establecido en \"true\". Esto se consigue eliminando el root de la ruta absoluta de cualquier ruta de archivo absoluta contenida en un archivo tar. Por ejemplo, \"home/user/.bashrc\" se convertir\u00eda en \"home/user/.bashrc\". Esta l\u00f3gica era insuficiente cuando las rutas de los archivos conten\u00edan roots de ruta repetidas, como \"////home/user/.bashrc\". \"node-tar\" s\u00f3lo eliminaba un \u00fanico root de esas rutas. Cuando se daba una ruta de archivo absoluta con ra\u00edces de ruta repetidas, la ruta resultante (por ejemplo, \"///home/user/.bashrc\") segu\u00eda resolvi\u00e9ndose como una ruta absoluta, permitiendo as\u00ed la creaci\u00f3n y sobrescritura de archivos arbitraria. Este problema se ha solucionado en las versiones 3.2.2, 4.4.14, 5.0.6 y 6.1.1. Los usuarios pueden solucionar esta vulnerabilidad sin necesidad de actualizar al crear un m\u00e9todo personalizado \"onentry\" que sanee \"entry.path\" o un m\u00e9todo \"filter\" que elimine las entradas con rutas absolutas. Consulte el aviso de GitHub mencionado para obtener m\u00e1s detalles. Tenga en cuenta CVE-2021-32803 que corrige un error similar en versiones posteriores de tar" } ], "id": "CVE-2021-32804", "lastModified": "2024-11-21T06:07:46.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.8, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-03T19:15:08.410", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4" }, { "source": "security-advisories@github.com", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" }, { "source": "security-advisories@github.com", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://www.npmjs.com/advisories/1770" }, { "source": "security-advisories@github.com", "tags": [ "Product", "Third Party Advisory" ], "url": "https://www.npmjs.com/package/tar" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://www.npmjs.com/advisories/1770" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://www.npmjs.com/package/tar" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2021-32804
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2021-32804", "description": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "id": "GSD-2021-32804", "references": [ "https://www.suse.com/security/cve/CVE-2021-32804.html", "https://access.redhat.com/errata/RHSA-2021:5086", "https://access.redhat.com/errata/RHSA-2021:4618", "https://access.redhat.com/errata/RHSA-2021:3666", "https://access.redhat.com/errata/RHSA-2021:3639", "https://access.redhat.com/errata/RHSA-2021:3638", "https://access.redhat.com/errata/RHSA-2021:3623", "https://access.redhat.com/errata/RHSA-2021:3281", "https://access.redhat.com/errata/RHSA-2021:3280", "https://advisories.mageia.org/CVE-2021-32804.html", "https://linux.oracle.com/cve/CVE-2021-32804.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-32804" ], "details": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "id": "GSD-2021-32804", "modified": "2023-12-13T01:23:09.273641Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32804", "STATE": "PUBLIC", "TITLE": "Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "node-tar", "version": { "version_data": [ { "version_value": "\u003c 3.2.2" }, { "version_value": "\u003e= 4.0.0, \u003c 4.4.14" }, { "version_value": "\u003e= 5.0.0, \u003c 5.0.6" }, { "version_value": "\u003e= 6.0.0, \u003c 6.1.1" } ] } } ] }, "vendor_name": "npm" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.npmjs.com/package/tar", "refsource": "MISC", "url": "https://www.npmjs.com/package/tar" }, { "name": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "refsource": "CONFIRM", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" }, { "name": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4", "refsource": "MISC", "url": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4" }, { "name": "https://www.npmjs.com/advisories/1770", "refsource": "MISC", "url": "https://www.npmjs.com/advisories/1770" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] }, "source": { "advisory": "GHSA-3jfq-g458-7qm9", "discovery": "UNKNOWN" } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c3.2.2||\u003e=4.0.0 \u003c4.4.14||\u003e=5.0.0 \u003c5.0.6||\u003e=6.0.0 \u003c6.1.1", "affected_versions": "All versions before 3.2.2, all versions starting from 4.0.0 before 4.4.14, all versions starting from 5.0.0 before 5.0.6, all versions starting from 6.0.0 before 6.1.1", "cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-22", "CWE-78", "CWE-937" ], "date": "2021-10-21", "description": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "fixed_versions": [ "3.2.2", "4.4.14", "5.0.6", "6.1.1" ], "identifier": "CVE-2021-32804", "identifiers": [ "GHSA-3jfq-g458-7qm9", "CVE-2021-32804" ], "not_impacted": "All versions starting from 3.2.2 before 4.0.0, all versions starting from 4.4.14 before 5.0.0, all versions starting from 5.0.6 before 6.0.0, all versions starting from 6.1.1", "package_slug": "npm/tar", "pubdate": "2021-08-03", "solution": "Upgrade to versions 3.2.2, 4.4.14, 5.0.6, 6.1.1 or above.", "title": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "urls": [ "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4", "https://www.npmjs.com/advisories/1770", "https://www.npmjs.com/package/tar", "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "https://www.oracle.com/security-alerts/cpuoct2021.html", "https://github.com/advisories/GHSA-3jfq-g458-7qm9" ], "uuid": "8d63f9f1-0a88-4f8d-b423-48892f01c709" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*", "cpe_name": [], "versionEndExcluding": "3.2.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*", "cpe_name": [], "versionEndExcluding": "4.4.14", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*", "cpe_name": [], "versionEndExcluding": "5.0.6", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*", "cpe_name": [], "versionEndExcluding": "6.1.1", "versionStartIncluding": "6.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:graalvm:20.3.3:*:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:graalvm:21.2.0:*:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.0.1.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32804" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-22" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.npmjs.com/advisories/1770", "refsource": "MISC", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://www.npmjs.com/advisories/1770" }, { "name": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4" }, { "name": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "refsource": "CONFIRM", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" }, { "name": "https://www.npmjs.com/package/tar", "refsource": "MISC", "tags": [ "Product", "Third Party Advisory" ], "url": "https://www.npmjs.com/package/tar" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2 } }, "lastModifiedDate": "2022-04-25T19:12Z", "publishedDate": "2021-08-03T19:15Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.